[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN105791323B - The defence method and equipment of unknown malware - Google Patents

The defence method and equipment of unknown malware Download PDF

Info

Publication number
CN105791323B
CN105791323B CN201610301012.7A CN201610301012A CN105791323B CN 105791323 B CN105791323 B CN 105791323B CN 201610301012 A CN201610301012 A CN 201610301012A CN 105791323 B CN105791323 B CN 105791323B
Authority
CN
China
Prior art keywords
malware
warning message
library
prestige library
prestige
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610301012.7A
Other languages
Chinese (zh)
Other versions
CN105791323A (en
Inventor
夏威
吴科庆
王以良
龚小刚
王红凯
张旭东
叶卫
姚杨
姚一杨
黄慧
沈潇军
沈志豪
张景明
冯宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Corp of China SGCC
State Grid Zhejiang Electric Power Co Ltd
Original Assignee
State Grid Corp of China SGCC
State Grid Zhejiang Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Corp of China SGCC, State Grid Zhejiang Electric Power Co Ltd filed Critical State Grid Corp of China SGCC
Priority to CN201610301012.7A priority Critical patent/CN105791323B/en
Publication of CN105791323A publication Critical patent/CN105791323A/en
Application granted granted Critical
Publication of CN105791323B publication Critical patent/CN105791323B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/568Computer malware detection or handling, e.g. anti-virus arrangements eliminating virus, restoring damaged files

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The present invention provides the defence method of unknown malware and equipment, belong to network safety filed.Malware including using virtual identification technology to obtain the vulnerability exploit stage generates the first warning message, first warning message is added to the record in prestige library, based on the record stored in prestige library, downloading behavior to Malware and the behavior communicated with Managed Servers intercept, generate the second warning message, according to the first warning message and the second warning message, already present Malware is cleared up.By using virtual identification technology and prestige library, the presence of Malware can be confirmed when using loophole, and the follow-up activities of Malware are tracked.Compared with the existing technology, the Malware for using novel attack pattern can be identified, has abandoned and has detected hysteresis quality using signature scheme bring, improve the defence capability to Malware, reduced and lost caused by Malware.

Description

The defence method and equipment of unknown malware
Technical field
The invention belongs to network safety fileds, the in particular to defence method and equipment of unknown malware.
Background technique
With the rapid development of science and technology, internet has been deep into all trades and professions, mentions in every aspect for people's lives Supply various conveniences.
But there is small part that there is the people compared with high-tech level, for the purpose for obtaining interests, make and use a variety of malice Software obtains other people important, privacy information, for example including worm, wooden horse, distributed denial of service (Distributed Denial of Service, DDoS) etc. virus or attack tool.Along with the progress of technology, above-mentioned virus or attack tool are Through by guard key, for example, threaten within 1st, deformation and advanced escape technology, Multi-stage attack, the APT attack such as polymorphic etc. it is novel Attack pattern has already appeared, and due to having used more new-type attack means, traditional security mechanism there is no above-mentioned attack pattern Method is effectively detected and is defendd, therefore causes huge loss.
In the prior art, for virus or malicious attack often or use signature detection traditional approach, without Method to non-traditional attack type virus or malicious attack mode effectively defendd.
Summary of the invention
In order to solve shortcoming and defect existing in the prior art, the present invention provides can to non-traditional attack pattern into The defence method and equipment of the unknown malware of row defence.
In order to reach above-mentioned technical purpose, on the one hand, described anti-the present invention provides the defence method of unknown malware Imperial method, comprising:
In threat analysis detection device, the Malware in vulnerability exploit stage is obtained by virtual identification technology, is generated The warning message, is added to the record in prestige library by the first warning message of the address including source address and Managed Servers In;
In intrusion prevention equipment, by the linkage with traditional intrusion prevention equipment, and it is based on storing in the prestige library Record, downloading behavior to Malware and the behavior communicated with Managed Servers intercept, and generates the second alarm signal Breath, and track the follow-up activities of the Malware;
According to first warning message and second warning message, already present Malware is cleared up;
Wherein, the virtual identification technology is to track under virtual environment to the behavior of target software, identifies the mesh Mark software behavior whether there is malicious sabotage movement, thus differentiate the target software whether be Malware technology.
Optionally, the Malware that the vulnerability exploit stage is obtained by virtual identification technology, comprising:
Network protocol is monitored, the network protocol includes remote file transferring agreement, simple postal transport protocol, network text Part server, User Datagram Protocol and hypertext transfer protocol;
Apocrypha is determined in the network protocol, by calling document analysis mould corresponding with the apocrypha The apocrypha is reduced to document form from traffic form by block;
It runs the apocrypha under virtual machine environment, obtains calling situation that memory after operation instructs and to operation The processing mode that system protection mechanism is taken;
If the calling situation has exceeded the calling range of normal file and/or adopts to the operating system protection mechanism The processing mode to detour has been taken, then has determined the apocrypha for Malware.
Optionally, the prestige library, comprising:
Cloud prestige library and local prestige library;
The record of warning message is stored in cloud prestige library, local prestige library periodically passes through the cloud prestige Library carries out record update;
The warning message that local network is got is stored in the local prestige library, the warning message includes malice The source address of software and the address of Managed Servers.
Optionally, second warning message include the Malware download path and with the Managed Servers Communication port.
Optionally, the defence method further include:
According to first warning message and second warning message, conversed analysis is carried out to the Malware, really The attack process of the fixed Malware.
On the other hand, the present invention also provides the defensive equipment of unknown malware, the defensive equipments, comprising:
Processing module, for obtaining the vulnerability exploit stage by virtual identification technology in threat analysis detection device Malware generates the first warning message of the address including source address and Managed Servers, the warning message is added Into the record in prestige library;
Blocking module, for by the linkage with traditional intrusion prevention equipment, and being based on described in intrusion prevention equipment The record stored in prestige library, downloading behavior to Malware and the behavior communicated with Managed Servers intercept, raw At the second warning message, and track the follow-up activities of the Malware;
Cleaning modul is used for according to first warning message and second warning message, soft to already present malice Part is cleared up;
Wherein, the virtual identification technology is to track under virtual environment to the behavior of target software, identifies the mesh Mark software behavior whether there is malicious sabotage movement, thus differentiate the target software whether be Malware technology.
Optionally, the processing module, comprising:
Monitoring submodule, for monitoring network protocol, the network protocol includes remote file transferring agreement, simple postal service Transport protocol, NetWare file server, User Datagram Protocol and hypertext transfer protocol;
Transform subblock, for determining apocrypha in the network protocol, by calling and the apocrypha pair The apocrypha is reduced to document form from traffic form by the document analysis module answered;
Submodule is run, for running the apocrypha under virtual machine environment, obtains the tune of memory instruction after operation With situation and the processing mode taken operating system protection mechanism;
Decision sub-module, if having exceeded the calling range of normal file and/or to the behaviour for the calling situation The processing mode of detour is taken as system protection mechanism, then determines the apocrypha for Malware.
Optionally, the prestige library includes cloud prestige library and local prestige library;
The record of warning message is stored in cloud prestige library, local prestige library periodically passes through the cloud prestige Library carries out record update;
The warning message that local network is got is stored in the local prestige library, the warning message includes malice The source address of software and the address of Managed Servers.
Optionally, second warning message include the Malware download path and with the Managed Servers Communication port.
Optionally, the defensive equipment further include:
Analysis module, for according to first warning message and second warning message, to the Malware into Row conversed analysis determines the attack process of the Malware.
Technical solution provided by the invention has the benefit that
By using virtual identification technology and prestige library, the presence of Malware can be confirmed when using loophole, and The follow-up activities of Malware are tracked.It compared with the existing technology, can be to the Malware for using novel attack pattern It is identified, has abandoned and detected hysteresis quality using signature scheme bring, improved the defence capability to Malware.
Detailed description of the invention
It, below will be to attached drawing needed in embodiment description in order to illustrate more clearly of technical solution of the present invention It is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, general for this field For logical technical staff, without creative efforts, it is also possible to obtain other drawings based on these drawings.
Fig. 1 is the flow diagram of the defence method of unknown malware provided by the invention;
Fig. 2 is the local flow diagram of the defence method of unknown malware provided by the invention;
Fig. 3 is another flow diagram of the defence method of unknown malware provided by the invention;
Fig. 4 is the structural schematic diagram of the defensive equipment of unknown malware provided by the invention;
Fig. 5 is the partial structural diagram of the defensive equipment of unknown malware provided by the invention;
Fig. 6 is another structural schematic diagram of the defensive equipment of unknown malware provided by the invention.
Specific embodiment
To keep structure and advantage of the invention clearer, structure of the invention is made further below in conjunction with attached drawing Description.
Embodiment one
The present invention provides the defence methods of unknown malware, as shown in Figure 1, the defence method, comprising:
11, in threat analysis detection device, the Malware in vulnerability exploit stage is obtained by virtual identification technology, it is raw At the first warning message of the address for including source address and Managed Servers, the warning message is added to the note in prestige library In record.
Why threat analysis detection device is used in a step 11, be because passing through in traditional threat detection technology It is often used the detection technique based on signature, when there is new threat, security firm needs to be found virus after a period of time, Signature could be provided for it so that under anti-virus tools could have the killing ability to the virus.But with skill The development of art, the attack pattern of similar " zero-day attacks " just have resulted in front of security firm finds virus or attack Great harm, and the technologies such as polymorphic and deformation are used with caution in attacker, so that security firm can not be by being received based on sample The mode of collection finds attack.Therefore, detection device is used in this application, is based on virtual identification technology, has been abandoned tradition Signature mechanism, can to loophole in such a way that behavior detects, before Malware causes damages, discovery The presence of Malware.
Based on threat analysis detection device and virtual identification technology, the stage energy of loophole can be utilized in Malware It was found that the presence of Malware, while the address based on corresponding with the Malware source address and Managed Servers that get The first warning message is sent, in order to carry out subsequent killing process.
The virtual identification technology used in threat analysis detection device, be under virtual environment to the behavior of target software into Line trace, identify the behavior of target software it is no there are the movements of malicious sabotage, to differentiate whether target software is Malware Technology, different from sandbox testing mechanism used in the prior art, particular technique details can be described below.
12, it in intrusion prevention equipment, by the linkage with traditional intrusion prevention equipment, and is based on depositing in the prestige library The record of storage, downloading behavior to Malware and the behavior communicated with Managed Servers intercept, and generate the second alarm Information, and track the follow-up activities of the Malware.
In step 12 use intrusion prevention equipment, between firewall and the equipment of network, by data packet into The side of row detection (check the data packet to network, determine the real purposes of data packet, then decide whether that it is allowed to enter Intranet) Formula carries out Prevention-Security.In step 12, intrusion prevention equipment obtains and intercepts first Malware behavior from prestige library Corresponding record, the behavior that Malware is downloaded the behavior of virus document and carried out telecommunication with Managed Servers carry out Comprehensive interception, prevent Malware more virus documents are downloaded from internet or the local privacy information that will acquire to Built-in Managed Servers are sent.While intercepting, the second warning message is generated at intrusion prevention equipment.
Since whether the uncertain Malware found will do it other behaviors, also need to after Malware Continuous activity is tracked, and subsequent data theft or lasting penetration activity are prevented.
13, according to first warning message and second warning message, already present Malware is cleared up.
It is right according to the details in warning message at two after getting the first warning message and the second warning message It has been acknowledged that existing Malware is cleared up, prevents Malware from carrying out subsequent destruction.;
Wherein, the virtual identification technology is to track under virtual environment to the behavior of target software, identifies the mesh Mark software behavior whether there is malicious sabotage movement, thus differentiate the target software whether be Malware technology
Optionally, as shown in Fig. 2, in step 11, the malice that the vulnerability exploit stage is obtained by virtual identification technology Software, comprising:
101, network protocol is monitored, the network protocol includes remote file transferring agreement, simple postal transport protocol, net Network file server, User Datagram Protocol and hypertext transfer protocol.
Here remote file transferring agreement (File Transfer Protocol, FTP) allows user by distance host On file copy to the computer of oneself on.Simple postal service transport protocol (Simple Mail transfer Protocol, SMTP) then it is used for transmission Email.NetWare file server (Network File Server, NFS) can make multiple stage computers Pellucidly access mutual catalogue.(User Datagram Protocol, UDP are located at biography to User Datagram Protocol as TCP Defeated layer and IP agreement are used cooperatively, and packet header are saved when transmitting data, but it cannot provide the re-transmission of data packet, so being suitble to Transmit shorter file.Hypertext transfer protocol (Hypertext transfer protocol, HTTP) is simple and direct, fast due to its The mode of speed is suitable for distributed Hypermedia Information System.The above-mentioned agreement enumerated belongs to the basic agreement in internet, nothing Which kind of attack pattern is used by attacker, above-mentioned agreement can not be got around substantially, therefore, above-mentioned basic agreement is monitored, energy Enough detection ranges expanded to Malware.
102, apocrypha is determined in the network protocol, by calling document analysis corresponding with the apocrypha The apocrypha is reduced to document form from traffic form by module.
103, it runs the apocrypha under virtual environment, obtains calling situation that memory after operation instructs and to behaviour The processing mode taken as system protection mechanism.
If 104, the calling situation has exceeded the calling range of normal file and/or protects machine to the operating system System takes the processing mode of detour, then determines the apocrypha for Malware.
In order to make it easy to understand, step 102 to step 104 is described for this sentences common pdf document.
Firstly, detecting the entitled .pdf's of suffix in the flow of smtp protocol after the content for executing step 101 File calls document analysis module, this document is reduced to the form of file from the flow detected.
Secondly, reading tool in operating system different under multiple virtual machine environments using different PDF and attempting to open File is got, why needs the combination using multiple and different environment, system and tool here, is because even can not The loophole that confirmation this document utilizes is the combination for which kind of environment, which kind of system or tool.
Again, after this document is triggered, it is confirmed whether to exist by detecting the variation of memory instruction level to utilize leakage The case where hole, if it is confirmed that the case where being utilized there are loophole, then suspicious determining this document is advanced Malware.Simultaneously If the memory calling situation of this document has had exceeded the calling range of normal file, such as calling system kernel process is drawn When fixed memory headroom or request are more than system more than half memory headrooms, suspicious judgements this document is Malware, or is to adopt With the advanced Malware of novel attack pattern.If after detecting that file is triggered, to the protection mechanism of operating system (such as Data execution protection data execution prevention-DEP, address space layout are randomized Address space Layout randomization-ASLR) processing mode of taking detour, it is soft equally to can determine that this document belongs to advanced malice Part.
In a step 11, Malware is detected by using the virtual identification technology based on virtual machine, and observed The real behavior of software has abandoned traditional signature scheme, Malware can be found in the vulnerability exploit stage, due to determining The reference called to memory is added in the process, prevents Malware that there is the escape technology to traditional approach such as sandboxs;And it is right Subsequent attack process is tracked, so that the consummatory behavior activation record of Malware is obtained, it can be to the danger of Malware The information such as evil degree, diffusion way carry out more detailed grasp.
Optionally, the prestige library, comprising:
Cloud prestige library and local prestige library;
The record of warning message is stored in cloud prestige library, local prestige library periodically passes through the cloud prestige Library carries out record update;
The warning message that local network is got is stored in the local prestige library, the warning message includes malice The source address of software and the address of Managed Servers.
In an implementation, since the time for attacking Main Stage in reality is shorter and shorter, often within a few hours even several seconds It completes, it is unlikely if being completely dependent on human response within so short time, it needs to establish a kind of based on prestige system The mode of the automation of system controls the development of threat, to directly block correlative flow.
As the concrete embodiment of credit system, prestige library is divided into cloud prestige library and local prestige library two parts.Local letter The warning message of threat detection equipment disposed in local network is collected in reputation library, extracts the source address of Malware and controlled The address of server and software signatures, and then the secure intelligence data repository by being integrally formed.And cloud prestige library can The record content in all local prestige libraries being attached thereto of merger, and by way of multi-party cooperative, it is formed more comprehensively complete Whole information data, and then all local prestige libraries being attached thereto are pushed to, in order to which intrusion prevention equipment is based on push more The defence that new signature identification is automated.
Optionally, second warning message include the Malware download path and with the Managed Servers Communication port.
In an implementation, Malware in a triggered, understands the networking of active to download newest virus base or to will acquire To important information be sent to the Managed Servers of predeterminated position, at this time IPS by the download path of virus base or with controlled clothes The communication port of business device carries out interception record, analyzes convenient for attack pattern of the later period to Malware.
Optionally, as shown in figure 3, the defence method further include:
14, according to first warning message and second warning message, conversed analysis is carried out to the Malware, Determine the attack process of the Malware.
In an implementation, it is based on the first warning message and the second warning message, other than directly clearing up Malware, Can also attack process to Malware, attack pattern record and analyze, determine the complete crawler behavior of the Malware Record, convenient for having more comprehensive grasp in harm, diffusion way to Malware etc..
The embodiment of the invention provides the defence method of unknown malware, it is included in and obtains leakage using virtual identification technology Hole generates the first warning message using the Malware in stage, and warning message is added to the record in prestige library, is based on prestige The record stored in library, downloading behavior to Malware and the behavior communicated with Managed Servers intercept, and generate the Two warning messages clear up already present Malware according to the first warning message and the second warning message.By using Virtual identification technology and prestige library can confirm the presence of Malware when using loophole, and to the subsequent of Malware Activity is tracked.Compared with the existing technology, it can identify that having abandoned makes to the Malware for using novel attack pattern Hysteresis quality is detected with signature scheme bring, improves the defence capability to Malware, reduces and is lost caused by Malware.
Embodiment two
The present invention also provides the defensive equipments 2 of unknown malware, as shown in figure 4, the defensive equipment 2, comprising:
Processing module 21, for obtaining the vulnerability exploit stage by virtual identification technology in threat analysis detection device Malware, generate include source address and Managed Servers address the first warning message, the warning message is added Add in the record in prestige library
Blocking module 22, for by the linkage with traditional intrusion prevention equipment, and being based on institute in intrusion prevention equipment The record stored in prestige library is stated, downloading behavior to Malware and the behavior communicated with Managed Servers intercept, The second warning message is generated, and tracks the follow-up activities of the Malware.
Cleaning modul 23 is used for according to first warning message and second warning message, to already present malice Software is cleared up;
Wherein, the virtual identification technology is to track under virtual environment to the behavior of target software, identifies the mesh Mark software behavior whether there is malicious sabotage movement, thus differentiate the target software whether be Malware technology.
In an implementation, the present invention also provides the defensive equipments of unknown malware, including processing module 21, blocking module 22 and totally three components of cleaning modul 23, it is respectively used to execute 11,12 and 13 three steps in embodiment one, actually make With in the process, processing module typically can be threat analysis detection device (Threat Analysis Center, TAC), energy It is enough based on virtual identification technology, traditional signature mechanism has been abandoned, the side detected using behavior to loophole can be passed through Formula finds the presence of Malware before Malware causes damages.Blocking module 22 can typically set for intrusion prevention Standby (Intrusion Prevention System, IPS) carries out the data packet intercepted by from the record in prestige library Detection, realizes the effect of defence.Processing module 21 and the specific process flow of blocking module 22 can be to walk in reference implementation example one Rapid 11 and step 12 detailed content, no longer repeated herein.
Optionally, as shown in figure 5, the processing module 21, comprising:
Monitoring submodule 211, for monitoring network protocol, the network protocol includes remote file transferring agreement, simple Postal transport protocol, NetWare file server, User Datagram Protocol and hypertext transfer protocol
Transform subblock 212, for determining apocrypha in the network protocol, by calling and the apocrypha The apocrypha is reduced to document form from traffic form by corresponding document analysis module.
Submodule 213 is run, for running the apocrypha under virtual environment, obtains the tune of memory instruction after operation With situation and the processing mode taken operating system protection mechanism.
Decision sub-module 214, if having exceeded the calling range of normal file and/or to described for the calling situation Operating system protection mechanism takes the processing mode of detour, then determines the apocrypha for Malware.
In an implementation, monitoring submodule 211 is used for, and after the content for executing step 101, is examined in the flow of smtp protocol The file for measuring an entitled .pdf of suffix calls document analysis module by transform subblock 212, by this document from detecting Flow in be reduced to the form of file.
Submodule 213 is run, for being read in different operating system under multiple virtual environments using different PDF Tool attempt open gets file, why need here be using the combination of multiple and different environment, system and tool It is the combination for which kind of environment, which kind of system or tool because can not even confirm the loophole that this document utilizes.
Decision sub-module 214, for after this document is triggered, the variation by detecting memory instruction level is to confirm It is no to there is the case where using loophole, if it is confirmed that the case where being utilized there are loophole, it is determined that this document is advanced Malware. If the memory calling situation of this document has had exceeded the calling range of normal file, such as calling system kernel process simultaneously When the memory headroom delimited or request are more than system more than half memory headrooms, suspicious judgement this document is Malware, or For using the advanced Malware of novel attack pattern.If after detecting that file is triggered, to the protection mechanism of operating system (such as data execution protection data execution prevention-DEP, address space layout are randomized Address Space layout randomization-ASLR) processing mode of taking detour, it is advanced equally to can determine that this document belongs to Malware.
Optionally, the prestige library, comprising:
Cloud prestige library and local prestige library;
The record of warning message is stored in cloud prestige library, local prestige library periodically passes through the cloud prestige Library carries out record update;
The warning message that local network is got is stored in the local prestige library, the warning message includes malice The source address of software and the address of Managed Servers.
In an implementation, Malware in a triggered, understands the networking of active to download newest virus base or to will acquire To important information be sent to the Managed Servers of predeterminated position, at this time IPS by the download path of virus base or with controlled clothes The communication port of business device carries out interception record, analyzes convenient for attack pattern of the later period to Malware.
Optionally, second warning message include the Malware download path and with the Managed Servers Communication port.
In an implementation, Malware in a triggered, understands the networking of active to download newest virus base or to will acquire To important information be sent to the Managed Servers of predeterminated position, at this time IPS by the download path of virus base or with controlled clothes The communication port of business device carries out interception record, analyzes convenient for attack pattern of the later period to Malware.
Optionally, as shown in fig. 6, the defensive equipment 2 further include:
Analysis module 24 is used for according to first warning message and second warning message, to the Malware Conversed analysis is carried out, determines the attack process of the Malware.
In an implementation, it is based on the first warning message and the second warning message, other than directly clearing up Malware, Can also attack process to Malware, attack pattern record and analyze, determine the complete crawler behavior of the Malware Record, convenient for having more comprehensive grasp in harm, diffusion way to Malware etc..
The embodiment of the invention provides unknown malware defensive equipment, it is included in and obtains loophole using virtual identification technology The first warning message is generated using the Malware in stage, and warning message is added to the record in prestige library, is based on prestige library The record of middle storage, downloading behavior to Malware and the behavior communicated with Managed Servers intercept, and generate second Warning message clears up already present Malware according to the first warning message and the second warning message.By using void Quasi- identification technology and prestige library can confirm the presence of Malware, and the subsequent work to Malware when using loophole It is dynamic to be tracked.Compared with the existing technology, the Malware for using novel attack pattern can be identified, has abandoned use Signature scheme bring detects hysteresis quality, improves the defence capability to Malware, reduces and loses caused by Malware.
Each serial number in above-described embodiment is for illustration only, the assembling for not representing each component or the elder generation in use process Sequence afterwards.
The above description is only an embodiment of the present invention, is not intended to limit the invention, all in the spirit and principles in the present invention Within, any modification, equivalent replacement, improvement and so on should all be included in the protection scope of the present invention.

Claims (8)

1. the defence method of unknown malware, which is characterized in that the defence method, comprising:
In threat analysis detection device, the Malware in vulnerability exploit stage is obtained by virtual identification technology, generation includes First warning message of the address of source address and Managed Servers, the warning message is added in the record in prestige library;
In intrusion prevention equipment, by the linkage with traditional intrusion prevention equipment, and based on the note stored in the prestige library Record, downloading behavior to Malware and behavior communicate with Managed Servers intercept, the second warning message of generation, and Track the follow-up activities of the Malware;
According to first warning message and second warning message, already present Malware is cleared up;
Wherein, the virtual identification technology is to track under virtual environment to the behavior of target software, identifies that the target is soft The behavior of part whether there is malicious sabotage movement, thus differentiate the target software whether be Malware technology;
Second warning message includes the download path of the Malware and the communication port with the Managed Servers.
2. the defence method of unknown malware according to claim 1, which is characterized in that described by virtually identifying skill The Malware in art acquisition vulnerability exploit stage, comprising:
Network protocol is monitored, the network protocol includes remote file transferring agreement, simple postal transport protocol, network file clothes Business device, User Datagram Protocol and hypertext transfer protocol;
Apocrypha is determined in the network protocol, it, will by calling document analysis module corresponding with the apocrypha The apocrypha is reduced to document form from traffic form;
The apocrypha is run under virtual environment, obtains memory instructs after running calling situation and protect to operating system The processing mode that protection mechanism is taken;
If the calling situation has exceeded the calling range of normal file and/or takes to the operating system protection mechanism The processing mode of detour then determines the apocrypha for Malware.
3. the defence method of unknown malware according to claim 1, which is characterized in that the prestige library, comprising:
Cloud prestige library and local prestige library;
Be stored with the record of warning message in cloud prestige library, local prestige library periodically by cloud prestige library into Row record updates;
The warning message that local network is got is stored in the local prestige library, the warning message includes Malware Source address and Managed Servers address.
4. the defence method of unknown malware according to claim 1, which is characterized in that the defence method also wraps It includes:
According to first warning message and second warning message, conversed analysis is carried out to the Malware, determines institute State the attack process of Malware.
5. the defence defensive equipment of unknown malware, which is characterized in that the defensive equipment, comprising:
Processing module, for obtaining the malice in vulnerability exploit stage by virtual identification technology in threat analysis detection device Software generates the first warning message of the address including source address and Managed Servers, the warning message is added to letter In the record for praising library;
Blocking module, for by the linkage with traditional intrusion prevention equipment, and being based on the prestige in intrusion prevention equipment The record stored in library, downloading behavior to Malware and the behavior communicated with Managed Servers intercept, and generate the Two warning messages, and track the follow-up activities of the Malware;
Cleaning modul, for according to first warning message and second warning message, to already present Malware into Row cleaning;
Wherein, the virtual identification technology is to track under virtual environment to the behavior of target software, identifies that the target is soft The behavior of part whether there is malicious sabotage movement, thus differentiate the target software whether be Malware technology;
Second warning message includes the download path of the Malware and the communication port with the Managed Servers.
6. the defence defensive equipment of unknown malware according to claim 5, which is characterized in that the processing module, Include:
Monitoring submodule, for monitoring network protocol, the network protocol includes remote file transferring agreement, simple postal transmission Agreement, NetWare file server, User Datagram Protocol and hypertext transfer protocol;
Transform subblock, it is corresponding with the apocrypha by calling for determining apocrypha in the network protocol The apocrypha is reduced to document form from traffic form by document analysis module;
Submodule is run, for running the apocrypha under virtual environment, obtains the calling situation of memory instruction after operation And to the processing mode that operating system protection mechanism is taken;
Decision sub-module, if having exceeded the calling range of normal file for the calling situation and/or being to the operation Blanket insurance protection mechanism takes the processing mode of detour, then determines the apocrypha for Malware.
7. the defence defensive equipment of unknown malware according to claim 5, it is characterised in that:
The prestige library includes cloud prestige library and local prestige library;
Be stored with the record of warning message in cloud prestige library, local prestige library periodically by cloud prestige library into Row record updates;
The warning message that local network is got is stored in the local prestige library, the warning message includes Malware Source address and Managed Servers address.
8. the defence defensive equipment of unknown malware according to claim 5, which is characterized in that the defensive equipment is also Include:
Analysis module, for being carried out to the Malware inverse according to first warning message and second warning message To analysis, the attack process of the Malware is determined.
CN201610301012.7A 2016-05-09 2016-05-09 The defence method and equipment of unknown malware Active CN105791323B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610301012.7A CN105791323B (en) 2016-05-09 2016-05-09 The defence method and equipment of unknown malware

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610301012.7A CN105791323B (en) 2016-05-09 2016-05-09 The defence method and equipment of unknown malware

Publications (2)

Publication Number Publication Date
CN105791323A CN105791323A (en) 2016-07-20
CN105791323B true CN105791323B (en) 2019-02-26

Family

ID=56401960

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610301012.7A Active CN105791323B (en) 2016-05-09 2016-05-09 The defence method and equipment of unknown malware

Country Status (1)

Country Link
CN (1) CN105791323B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11546768B2 (en) 2017-01-22 2023-01-03 Huawei Technologies Co., Ltd. Application download monitoring method and device
CN108632225A (en) * 2017-03-23 2018-10-09 中兴通讯股份有限公司 A kind of method and system that defending against network threatens
CN109214190B (en) * 2018-08-30 2022-05-20 腾讯科技(深圳)有限公司 Method and device for determining sample files of exploit
CN109818984A (en) * 2019-04-10 2019-05-28 吉林亿联银行股份有限公司 The defence method and device of loophole
CN112152970A (en) * 2019-06-28 2020-12-29 北京奇虎科技有限公司 Method and apparatus for restricting malicious applications from using network, router and medium
CN111625828B (en) * 2020-07-29 2021-02-26 杭州海康威视数字技术股份有限公司 Lesovirus defense method and device and electronic equipment
CN118381675B (en) * 2024-06-24 2024-10-18 军工保密资格审查认证中心 Data processing method and device and electronic equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101959193A (en) * 2010-09-26 2011-01-26 宇龙计算机通信科技(深圳)有限公司 Information safety detection method and a mobile terminal
CN102662873A (en) * 2012-04-01 2012-09-12 珠海市泉道电子有限公司 Device for realizing insulation blocking of storage carrier data
CN103810427A (en) * 2014-02-20 2014-05-21 中国科学院信息工程研究所 Mining method and system for malicious code hiding behaviors
CN104506495A (en) * 2014-12-11 2015-04-08 国家电网公司 Intelligent network APT attack threat analysis method

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9047441B2 (en) * 2011-05-24 2015-06-02 Palo Alto Networks, Inc. Malware analysis system
US20130067578A1 (en) * 2011-09-08 2013-03-14 Mcafee, Inc. Malware Risk Scanner
CN103839003B (en) * 2012-11-22 2018-01-30 腾讯科技(深圳)有限公司 Malicious file detection method and device
CN103646213B (en) * 2013-09-26 2016-06-01 北京神州绿盟信息安全科技股份有限公司 The sorting technique of a kind of malice software and device
CN103793646A (en) * 2014-02-14 2014-05-14 浪潮通信信息系统有限公司 Virtual machine safety monitoring method based on behavior recognition

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101959193A (en) * 2010-09-26 2011-01-26 宇龙计算机通信科技(深圳)有限公司 Information safety detection method and a mobile terminal
CN102662873A (en) * 2012-04-01 2012-09-12 珠海市泉道电子有限公司 Device for realizing insulation blocking of storage carrier data
CN103810427A (en) * 2014-02-20 2014-05-21 中国科学院信息工程研究所 Mining method and system for malicious code hiding behaviors
CN104506495A (en) * 2014-12-11 2015-04-08 国家电网公司 Intelligent network APT attack threat analysis method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"恶意代码云主动防御系统设计与实现";邹航 等;《重庆理工大学学报(自然科学版)》;20140531;第28卷(第5期);第84-92页

Also Published As

Publication number Publication date
CN105791323A (en) 2016-07-20

Similar Documents

Publication Publication Date Title
CN105791323B (en) The defence method and equipment of unknown malware
Rawat et al. Association rule learning for threat analysis using traffic analysis and packet filtering approach
Vukalović et al. Advanced persistent threats-detection and defense
Singh et al. A framework for zero-day vulnerabilities detection and prioritization
Caswell et al. Snort intrusion detection and prevention toolkit
RU2495486C1 (en) Method of analysing and detecting malicious intermediate nodes in network
Punithavathani et al. Surveillance of anomaly and misuse in critical networks to counter insider threats using computational intelligence
CN105915532B (en) A kind of recognition methods of host of falling and device
US20080098476A1 (en) Method and Apparatus for Defending Against Zero-Day Worm-Based Attacks
US9450974B2 (en) Intrusion management
US7810158B2 (en) Methods and systems for deceptively trapping electronic worms
Wang et al. Detecting targeted attacks by multilayer deception
Pandey et al. A lifecycle based approach for malware analysis
Gür et al. Security analysis of computer networks: Key concepts and methodologies
Dutta et al. Intrusion detection systems fundamentals
Hermanowski Open source security information management system supporting it security audit
Sherif et al. Intrusion detection: methods and systems. Part II
CN117544335A (en) Bait activation method, device, equipment and storage medium
Zhao et al. Network security model based on active defense and passive defense hybrid strategy
Kishore et al. Intrusion Detection System a Need
AT&T sample_cyber_security
Sadhukhan et al. Cyber Attack Thread: A control-flow based approach to deconstruct and mitigate cyber threats
Sharma et al. Detection and prevention of DoS and DDoS in IoT
EP3595257B1 (en) Detecting suspicious sources, e.g. for configuring a distributed denial of service mitigation device
Sandhu et al. A study of the novel approaches used in intrusion detection and prevention systems

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant