CN102982284B - For the scanning device of rogue program killing, cloud management equipment and method and system - Google Patents
For the scanning device of rogue program killing, cloud management equipment and method and system Download PDFInfo
- Publication number
- CN102982284B CN102982284B CN201210506137.5A CN201210506137A CN102982284B CN 102982284 B CN102982284 B CN 102982284B CN 201210506137 A CN201210506137 A CN 201210506137A CN 102982284 B CN102982284 B CN 102982284B
- Authority
- CN
- China
- Prior art keywords
- scanning
- specified
- information
- program file
- client device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 230000002147 killing effect Effects 0.000 title claims abstract description 73
- 238000000034 method Methods 0.000 title claims abstract description 62
- 230000005540 biological transmission Effects 0.000 claims abstract description 72
- 230000008439 repair process Effects 0.000 claims description 77
- 238000007726 management method Methods 0.000 claims description 38
- 230000008569 process Effects 0.000 claims description 26
- 238000012545 processing Methods 0.000 claims description 16
- 238000009434 installation Methods 0.000 claims description 13
- 238000004422 calculation algorithm Methods 0.000 claims description 7
- 238000001514 detection method Methods 0.000 claims description 5
- 238000003672 processing method Methods 0.000 claims description 2
- 230000000875 corresponding effect Effects 0.000 description 23
- 230000008901 benefit Effects 0.000 description 4
- 241000700605 Viruses Species 0.000 description 3
- 230000009471 action Effects 0.000 description 3
- 238000004458 analytical method Methods 0.000 description 3
- 238000004891 communication Methods 0.000 description 3
- 230000007613 environmental effect Effects 0.000 description 3
- 101100217298 Mus musculus Aspm gene Proteins 0.000 description 2
- 230000002155 anti-virotic effect Effects 0.000 description 2
- 238000004590 computer program Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- ZXQYGBMAQZUVMI-GCMPRSNUSA-N gamma-cyhalothrin Chemical compound CC1(C)[C@@H](\C=C(/Cl)C(F)(F)F)[C@H]1C(=O)O[C@H](C#N)C1=CC=CC(OC=2C=CC=CC=2)=C1 ZXQYGBMAQZUVMI-GCMPRSNUSA-N 0.000 description 2
- 238000000429 assembly Methods 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 230000002085 persistent effect Effects 0.000 description 1
Landscapes
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Information Transfer Between Computers (AREA)
Abstract
本发明公开了一种用于恶意程序查杀的扫描设备、云端管理设备及方法和系统。其中,一种用于恶意程序查杀的云端管理设备,包括:第二传输接口;第一指示器,被配置为根据新生恶意程序的特性和客户端设备传输的系统环境信息生成第一扫描内容指示;第一匹配器,被配置为通过第二传输接口获得客户端设备传输的所述未知程序文件的特征数据,并据此在已知的恶意程序特征数据记录中进行匹配;以及第二指示器,被配置为当第一匹配器未能匹配到已知记录时生成第二扫描内容指示,第二扫描内容指示包括对所述未知程序文件的指定属性和/或所述未知程序文件的上下文环境的指定属性进行扫描,并通过第二传输接口传输至客户端设备。
The invention discloses a scanning device, a cloud management device, a method and a system for scanning and killing malicious programs. Among them, a cloud management device for killing malicious programs, including: a second transmission interface; a first indicator configured to generate the first scan content according to the characteristics of the new malicious program and the system environment information transmitted by the client device indication; the first matcher is configured to obtain the characteristic data of the unknown program file transmitted by the client device through the second transmission interface, and perform matching in the known malicious program characteristic data records accordingly; and the second indication A device configured to generate a second scan content indication when the first matcher fails to match a known record, the second scan content indication includes specified attributes for the unknown program file and/or the context of the unknown program file The specified attributes of the environment are scanned and transmitted to the client device through the second transmission interface.
Description
技术领域technical field
本发明涉及网络信息安全技术领域,具体涉及一种用于恶意程序查杀的扫描、云端管理设备及方法和系统。The invention relates to the technical field of network information security, in particular to a scanning and cloud management device, method and system for scanning and killing malicious programs.
背景技术Background technique
现有的恶意程序查杀方法,大多由本地引擎根据内置的扫描位置进行扫描,把本地无法识别的未知程序文件的MD5等特征发送给云端服务器,由云端服务器根据客户端发送的程序文件特征进行比对并判断是否为恶意程序,如果是恶意程序客户端本地引擎再根据内置客户端本地的清除逻辑清理恶意程序。然而在恶意程序与安全软件白热化的持续对抗中,恶意程序作者总会找到操作系统新的可利用的点和安全软件忽视的点从而绕过安全软件的检测和查杀。此时安全厂商拿到恶意程序的样本后,通常需要修改本地引擎才能查杀新的恶意程序,从拿到样本到人工分析然后把新版本引擎程序文件升级到所有客户端,在这期间恶意程序已经大面积传播。Most of the existing malware detection and killing methods use the local engine to scan according to the built-in scanning position, and send the MD5 and other characteristics of the unknown program files that cannot be recognized locally to the cloud server, and the cloud server performs the detection according to the characteristics of the program files sent by the client. Compare and judge whether it is a malicious program. If it is a malicious program, the client's local engine will clean up the malicious program according to the built-in client's local clearing logic. However, in the continuous fierce confrontation between malicious programs and security software, malicious program authors will always find new exploitable points in the operating system and points ignored by security software, thereby bypassing the detection and killing of security software. At this time, after the security vendor gets the sample of the malicious program, it usually needs to modify the local engine to detect and kill the new malicious program. From obtaining the sample to manual analysis and then upgrading the new version of the engine program file to all clients, during this period the malicious program has spread widely.
发明内容Contents of the invention
鉴于上述问题,提出了本发明以便提供一种克服上述问题或者至少部分地解决上述问题的用于恶意程序查杀的扫描设备和相应的扫描方法,以及用于恶意程序查杀的云端管理设备和相应的云端管理方法,以及一种基于云安全的恶意程序扫描系统和扫描方法。In view of the above problems, the present invention is proposed in order to provide a scanning device for killing malicious programs and a corresponding scanning method that overcomes the above problems or at least partially solves the above problems, as well as a cloud management device and A corresponding cloud management method, and a malicious program scanning system and scanning method based on cloud security.
依据本发明的一个方面,提供了一种用于恶意程序查杀的扫描设备,包括:第一传输接口,被配置为向服务器端设备传输信息,以及接收服务器端设备传输的信息;环境信息读取器,被配置为读取客户端设备当前的系统环境信息,并通过第一传输接口传输至服务器端设备;第一扫描器,被配置为通过第一传输接口获得服务器端设备至少基于系统环境信息判断的第一扫描内容指示,并对第一扫描内容指示中的指定位置进行扫描,以及至少将扫描得到的未知程序文件的特征数据通过第一传输接口传输至服务器端设备;以及第二扫描器,被配置为通过第一传输接口获得服务器端设备传输的第二扫描内容指示,第二扫描内容指示包括对未知程序文件的指定属性和/或未知程序文件的上下文环境的指定属性进行扫描,以及根据第二扫描内容指示进行扫描。According to one aspect of the present invention, a scanning device for scanning and killing malicious programs is provided, including: a first transmission interface configured to transmit information to a server-side device and receive information transmitted by the server-side device; environment information reading A fetcher, configured to read the current system environment information of the client device, and transmit it to the server device through the first transmission interface; a first scanner, configured to obtain at least the system environment information of the server device through the first transmission interface The information judges the first scan content indication, and scans the specified position in the first scan content indication, and at least transmits the characteristic data of the unknown program file obtained through the scan to the server-end device through the first transmission interface; and the second scan The device is configured to obtain a second scan content indication transmitted by the server-end device through the first transmission interface, the second scan content indication includes scanning specified attributes of unknown program files and/or specified attributes of context environments of unknown program files, And scan according to the second scan content instruction.
根据本发明的另一方面,提供了种用于恶意程序查杀的云端管理设备,包括:第二传输接口,被配置为向客户端设备传输信息,以及接收客户端设备传输的信息;第一指示器,被配置为根据新生恶意程序的特性和客户端设备传输的系统环境信息生成第一扫描内容指示,第一扫描内容指示至少包括对指定位置的内容进行扫描并告知扫描到的未知程序文件的特征数据,以及通过第二传输接口将第一扫描内容指示传输至客户端设备;第一匹配器,被配置为通过第二传输接口获得客户端设备传输的未知程序文件的特征数据,并据此在已知的恶意程序特征数据记录中进行匹配;以及第二指示器,被配置为当第一匹配器未能匹配到已知记录时生成第二扫描内容指示,第二扫描内容指示包括对未知程序文件的指定属性和/或未知程序文件的上下文环境的指定属性进行扫描,并通过第二传输接口传输至客户端设备。According to another aspect of the present invention, there is provided a cloud management device for killing malicious programs, including: a second transmission interface configured to transmit information to a client device and receive information transmitted by the client device; The indicator is configured to generate a first scanning content indication according to the characteristics of the new malicious program and the system environment information transmitted by the client device, the first scanning content indication at least includes scanning the content of a specified location and notifying the scanned unknown program file feature data, and transmit the first scan content indication to the client device through the second transmission interface; the first matcher is configured to obtain the feature data of the unknown program file transmitted by the client device through the second transmission interface, and according to This performs a match in known malicious program signature data records; and a second indicator configured to generate a second scan content indication when the first matcher fails to match a known record, the second scan content indication includes a reference to The specified attribute of the unknown program file and/or the specified attribute of the context environment of the unknown program file are scanned, and transmitted to the client device through the second transmission interface.
根据本发明的又一方面,提供了一种基于云安全的恶意程序扫描系统,包括如上的任一用于恶意程序查杀的扫描设备,以及如上的任一用于恶意程序查杀的云端管理设备。According to yet another aspect of the present invention, a malicious program scanning system based on cloud security is provided, including any of the above scanning devices for scanning and killing malicious programs, and any of the above cloud management devices for scanning and killing malicious programs equipment.
根据本发明的又一方面,提供了一种用于恶意程序查杀的云端管理方法,包括:根据新生恶意程序的特性和客户端设备传输的系统环境信息生成第一扫描内容指示,第一扫描内容指示至少包括对指定位置的内容进行扫描并告知扫描到的未知程序文件的特征数据,以及将第一扫描内容指示传输至客户端设备;获得客户端设备传输的未知程序文件的特征数据,并据此在已知的恶意程序查杀数据库中进行匹配;以及当根据未知程序文件的特征数据未能匹配到已知记录时,生成第二扫描内容指示,第二扫描内容指示包括对未知程序文件的指定属性和/或未知程序文件的上下文环境的指定属性进行扫描,并将第二扫描内容指示传输至客户端设备。According to yet another aspect of the present invention, a cloud management method for scanning and killing malicious programs is provided, including: generating a first scan content indication according to the characteristics of new malicious programs and the system environment information transmitted by the client device, the first scanning The content indication at least includes scanning the content of the specified location and notifying the characteristic data of the scanned unknown program file, and transmitting the first scanned content indication to the client device; obtaining the characteristic data of the unknown program file transmitted by the client device, and Accordingly, matching is performed in the known malicious program killing database; and when a known record cannot be matched according to the feature data of the unknown program file, a second scanning content indication is generated, and the second scanning content indication includes an indication of the unknown program file and/or the specified attribute of the context environment of the unknown program file, and transmit the second scanned content indication to the client device.
根据本发明的又一方面,提供了一种基于云安全的恶意程序扫描方法,包括:客户端设备读取当前的系统环境信息,并传输至服务器端设备;服务器端设备根据新生恶意程序的特性和客户端设备传输的系统环境信息生成第一扫描内容指示,第一扫描内容指示至少包括对指定位置的内容进行扫描并告知扫描到的未知程序文件的特征数据,以及将第一扫描内容指示传输至客户端设备;客户端设备根据第一扫描内容指示进行扫描,并至少将扫描得到的未知程序文件的特征数据传输至服务器端设备;服务器端设备根据未知程序文件的特征数据在已知的恶意程序查杀数据库中进行匹配;当根据未知程序文件的特征数据未能匹配到已知记录时,服务器端设备生成第二扫描内容指示,第二扫描内容指示包括对未知程序文件的指定属性和/或未知程序文件的上下文环境的指定属性进行扫描,并将第二扫描内容指示传输至客户端设备;客户端设备根据第二扫描内容指示进行扫描。According to yet another aspect of the present invention, a method for scanning malicious programs based on cloud security is provided, including: the client device reads the current system environment information and transmits it to the server-end device; Generate a first scan content indication with the system environment information transmitted by the client device, the first scan content indication at least includes scanning the content of the specified location and notifying the feature data of the scanned unknown program file, and transmitting the first scan content indication to the client device; the client device scans according to the first scanning content instruction, and at least transmits the characteristic data of the unknown program file obtained through scanning to the server device; Matching is performed in the program killing database; when a known record cannot be matched according to the characteristic data of the unknown program file, the server-side device generates a second scanning content indication, and the second scanning content indication includes the specified attribute and/or of the unknown program file or the specified attribute of the context environment of the unknown program file, and transmit the second scan content indication to the client device; the client device scans according to the second scan content indication.
根据本发明提供的实施例可以看出,在仅通过未知程序文件的基本特征数据(如文件名、MD5、SHA1或根据文件内容计算出的其他特征等)无法判断是否为恶意程序或者无法找到准确的修复方案时,可以再通过要求客户端设备进一步扫描未知程序文件的签名、版本等指定属性和/或未知程序文件的上下文环境的属性来做进一步判断,从而能更准确的判断出客户端自己无法确定是否安全的未知程序文件。由于采用这种方案,云端服务器及时下发个性化的扫描内容,并根据程序文件的属性及其所在上下文环境的属性从服务器端动态获取查杀方法,避免了通过升级本地特征库和引擎程序才能检测和清除新生恶意程序,从而加快了对新生恶意程序的打击速度,有效地遏制了其快速蔓延。According to the embodiments provided by the present invention, it can be seen that it is impossible to judge whether it is a malicious program or to find out the exact feature data (such as file name, MD5, SHA1 or other features calculated according to the content of the file, etc.) When repairing the solution, you can make further judgments by requiring the client device to further scan the specified attributes such as the signature and version of the unknown program file and/or the attributes of the context environment of the unknown program file, so that the client itself can be more accurately judged. Unknown program file that could not be determined to be safe. Because of this solution, the cloud server sends personalized scanning content in time, and dynamically obtains the killing method from the server side according to the attributes of the program file and the attributes of the context environment, avoiding the need to upgrade the local feature library and engine program. Detect and remove new malicious programs, thereby speeding up the attack on new malicious programs and effectively curbing their rapid spread.
上述说明仅是本发明技术方案的概述,为了能够更清楚了解本发明的技术手段,而可依照说明书的内容予以实施,并且为了让本发明的上述和其它目的、特征和优点能够更明显易懂,以下特举本发明的具体实施方式。The above description is only an overview of the technical solution of the present invention. In order to better understand the technical means of the present invention, it can be implemented according to the contents of the description, and in order to make the above and other purposes, features and advantages of the present invention more obvious and understandable , the specific embodiments of the present invention are enumerated below.
附图说明Description of drawings
通过阅读下文优选实施方式的详细描述,各种其他的优点和益处对于本领域普通技术人员将变得清楚明了。附图仅用于示出优选实施方式的目的,而并不认为是对本发明的限制。而且在整个附图中,用相同的参考符号表示相同的部件。在附图中:Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiment. The drawings are only for the purpose of illustrating a preferred embodiment and are not to be considered as limiting the invention. Also throughout the drawings, the same reference numerals are used to designate the same parts. In the attached picture:
图1示出了根据本发明一个实施例的基于云安全的恶意程序扫描系统;Fig. 1 shows a malicious program scanning system based on cloud security according to an embodiment of the present invention;
图2示出了根据本发明一个实施例的基于云安全的恶意程序扫描方法流程图;以及FIG. 2 shows a flowchart of a method for scanning malicious programs based on cloud security according to an embodiment of the present invention; and
图3示出了根据本发明又一个实施例的基于云安全的恶意程序查杀方法流程图。Fig. 3 shows a flowchart of a method for detecting and killing malicious programs based on cloud security according to yet another embodiment of the present invention.
具体实施方式detailed description
下面将参照附图更详细地描述本公开的示例性实施例。虽然附图中显示了本公开的示例性实施例,然而应当理解,可以以各种形式实现本公开而不应被这里阐述的实施例所限制。相反,提供这些实施例是为了能够更透彻地理解本公开,并且能够将本公开的范围完整的传达给本领域的技术人员。Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.
本发明实施例可以应用于计算机系统/服务器,其可与众多其它通用或专用计算系统环境或配置一起操作。适于与计算机系统/服务器一起使用的众所周知的计算系统、环境和/或配置的例子包括但不限于:个人计算机系统、服务器计算机系统、瘦客户机、厚客户机、手持或膝上设备、基于微处理器的系统、机顶盒、可编程消费电子产品、网络个人电脑、小型计算机系统﹑大型计算机系统和包括上述任何系统的分布式云计算技术环境,等等。Embodiments of the invention may be applied to computer systems/servers that are operational with numerous other general purpose or special purpose computing system environments or configurations. Examples of well-known computing systems, environments and/or configurations suitable for use with computer systems/servers include, but are not limited to: personal computer systems, server computer systems, thin clients, thick clients, handheld or laptop devices, Microprocessor-based systems, set-top boxes, programmable consumer electronics, networked personal computers, minicomputer systems, mainframe computer systems, and distributed cloud computing technology environments including any of the above, etc.
计算机系统/服务器可以在由计算机系统执行的计算机系统可执行指令(诸如程序模块)的一般语境下描述。通常,程序模块可以包括例程、程序、目标程序、组件、逻辑、数据结构等等,它们执行特定的任务或者实现特定的抽象数据类型。计算机系统/服务器可以在分布式云计算环境中实施,分布式云计算环境中,任务是由通过通信网络链接的远程处理设备执行的。在分布式云计算环境中,程序模块可以位于包括存储设备的本地或远程计算系统存储介质上。Computer systems/servers may be described in the general context of computer system-executable instructions, such as program modules, being executed by the computer system. Generally, program modules may include routines, programs, objects, components, logic, data structures, etc., that perform particular tasks or implement particular abstract data types. The computer system/server can be practiced in distributed cloud computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed cloud computing environment, program modules may be located in both local and remote computing system storage media including storage devices.
请参阅图1,其示出了根据本发明一个实施例的基于云安全的恶意程序扫描系统,包括用于恶意程序查杀的扫描设备110,以及用于恶意程序查杀的云端管理设备210,其中,扫描设备110可以设置于客户端,比如客户端设备100中,云端管理设备210可以设置于服务器端,比如服务器端设备200中。扫描设备110可以和云端管理设备210进行通信,具体而言,扫描设备110中的第一传输接口112可以向服务器端设备200传输信息,以及接收服务器端设备200传输的信息;云端管理设备的第二传输接口218可以向客户端设备100传输信息,以及接收客户端设备100传输的信息。其中,扫描设备110可以包括环境信息读取器112、第一扫描器114、第二扫描器116以及第一传输接口118。云端管理设备210可以包括第一指示器212、第一匹配器214、第二指示器216以及第二传输接口218。Please refer to FIG. 1 , which shows a malicious program scanning system based on cloud security according to an embodiment of the present invention, including a scanning device 110 for checking and killing malicious programs, and a cloud management device 210 for checking and killing malicious programs. Wherein, the scanning device 110 can be set on the client, such as the client device 100 , and the cloud management device 210 can be set on the server, such as the server device 200 . The scanning device 110 can communicate with the cloud management device 210, specifically, the first transmission interface 112 in the scanning device 110 can transmit information to the server device 200, and receive the information transmitted by the server device 200; The second transmission interface 218 can transmit information to the client device 100 and receive information transmitted by the client device 100 . Wherein, the scanning device 110 may include an environment information reader 112 , a first scanner 114 , a second scanner 116 and a first transmission interface 118 . The cloud management device 210 may include a first indicator 212 , a first matcher 214 , a second indicator 216 and a second transmission interface 218 .
首先,环境信息读取器112读取客户端设备100当前的系统环境信息,并通过第一传输接口118传输至服务器端设备200的第二传输接口218。客户端设备100当前的系统环境信息可以包括很多,比如操作系统的版本信息、系统补丁安装信息、软件安装信息、驱动安装信息以及活动进程和服务信息等信息中的任意一种或多种。其中,操作系统有很多种,比如windows98、windows2003、windowsXP以及WindowsVista等,不同操作系统对应的版本信息也不同,因此通过操作系统的版本信息,服务器端设备200就可以知道客户端设备100当前运行的是哪种具体版本的操作系统。活动进程即为系统中正在运行的进程,可以通过调用相应的API(ApplicationProgrammingInterface,应用程序编程接口)函数等多种手段在系统中查询到当正在运行的各种进程信息,以及进程相关的标识符,用户名,cpu占用率,内存占用率,描述信息等。在客户端设备100初始化本地引擎和网络环境之后,环境信息读取器112就可以读取当前的系统环境信息,并传输至服务端设备200。First, the environment information reader 112 reads the current system environment information of the client device 100 and transmits it to the second transmission interface 218 of the server device 200 through the first transmission interface 118 . The current system environment information of the client device 100 may include many, such as any one or more of operating system version information, system patch installation information, software installation information, driver installation information, and active process and service information. Among them, there are many kinds of operating systems, such as windows98, windows2003, windowsXP, and WindowsVista, etc., and the version information corresponding to different operating systems is also different. Therefore, through the version information of the operating system, the server device 200 can know the current operating system of the client device 100. Which specific version of the operating system. The active process is the running process in the system. You can query the various running process information and process-related identifiers in the system by calling the corresponding API (Application Programming Interface, application programming interface) function and other means. , user name, cpu usage rate, memory usage rate, description information, etc. After the client device 100 initializes the local engine and the network environment, the environment information reader 112 can read the current system environment information and transmit it to the server device 200 .
位于服务器端设备200中的云端管理设备210中的第二传输接口218接收到客户端设备100当前的系统环境信息之后,传输给第一指示器212,进而第一指示器212根据新生恶意程序的特性和客户端设备100传输的系统环境信息生成第一扫描内容指示。其中,新生恶意程序的特性可以有很多种,比如根据最新恶意程序的流行趋势分析出的新生恶意程序利用特定位置进行隐藏和/或攻击的特征信息,比如新生恶意程序通常利用的位置,如某游戏的安装目录、常用软件的安装目录、某些特定的注册表项等。进而,服务器端设备200可以根据新生恶意程序通常利用的隐藏和/或攻击位置,结合客户端设备上报的当前系统环境信息,就可以给出针对该客户端设备个性化的扫描内容指示,即第一扫描内容指示。比如通过客户端设备100上报的软件安装信息发现该客户端设备100安装了某个游戏软件,而根据新生恶意程序的特性知道当前很多恶意程序都是利用该游戏软件的安装目录进行隐藏或恶意替换文件,则服务器端设备200就会在第一扫描内容指示中要求客户端设备100扫描该游戏安装目录下的内容,以便发现该客户端设备100中可疑的未知程序文件。可以看出,由于第一扫描内容指示不仅仅依据服务器端掌握的新生恶意程序的特性,还要结合客户端设备100的具体系统环境信息,因此第一扫描内容指示是个性化的,有针对性的,针对不同的客户端设备100下发的第一扫描内容指示往往是不同的。After receiving the current system environment information of the client device 100, the second transmission interface 218 in the cloud management device 210 located in the server device 200 transmits it to the first indicator 212, and then the first indicator 212 according to the new malicious program The characteristics and system environment information transmitted by the client device 100 generate a first scan content indication. Among them, there are many kinds of characteristics of the new malicious program, for example, according to the trend analysis of the latest malicious program, the characteristic information of the new malicious program using a specific location to hide and/or attack, such as the location usually used by the new malicious program, such as a certain The installation directory of the game, the installation directory of commonly used software, some specific registry entries, etc. Furthermore, the server-side device 200 can give a personalized scanning content indication for the client device according to the hidden and/or attack location usually used by the newly-born malicious program, combined with the current system environment information reported by the client device, that is, the first A scan content indication. For example, through the software installation information reported by the client device 100, it is found that the client device 100 has installed a certain game software, and according to the characteristics of new malicious programs, it is known that many malicious programs currently use the installation directory of the game software to hide or maliciously replace file, the server device 200 will request the client device 100 to scan the content under the game installation directory in the first scanning content instruction, so as to find suspicious unknown program files in the client device 100 . It can be seen that since the first scan content indication is not only based on the characteristics of the new malicious program mastered by the server, but also combined with the specific system environment information of the client device 100, the first scan content indication is personalized and targeted Yes, the first scan content indications issued for different client devices 100 are often different.
在第一扫描内容指示中至少包括对指定位置的内容进行扫描并要求告知扫描到的未知程序文件的特征数据,具体而言,第一扫描内容指示可以是根据新生恶意程序的特性和客户端设备100当前的系统环境信息生成的一段文本或脚本,即通过该指示可以告知客户端设备100需要扫描哪些内容,以及上报哪些扫描结果。The first scanning content indication at least includes scanning the content of the specified location and requiring notification of the feature data of the scanned unknown program file. Specifically, the first scanning content indication may be based on the characteristics of the new malicious program and the client device 100 is a piece of text or script generated by the current system environment information, that is, through this instruction, the client device 100 can be informed of what content needs to be scanned and what scanning results should be reported.
应当注意的是,第一扫描内容指示可以是不附带任何条件的指示,也可以是附条件的指示。如果是附条件的指示,则只有在满足预置条件时,客户端设备100中的扫描设备110才根据第一扫描内容指示进行扫描。第一扫描指示可以附带的条件有很多,比如包括但不限于下述内容中的一种或多种:指定文件是否存在、指定目录是否存在、程序文件的属性是否满足指定条件(比如消息摘要MD5是否为指定值)、指定注册表键是否存在、指定注册表键值是否存在、注册表键的内容是否满足指定条件、注册表键值的内容是否满足指定条件(比如是否包含或等于特定字符串或者某个值)、指定进程是否存在、指定服务是否存在以及指定服务是否满足指定的条件(比如是否为特定的服务名称、特定的服务描述或特定的显示名称)等。It should be noted that the first scan content indication may be an indication without any condition, or an indication with a condition. If it is a conditional instruction, the scanning device 110 in the client device 100 will scan according to the first scanning content instruction only when the preset condition is satisfied. There are many conditions that can be attached to the first scan indication, such as including but not limited to one or more of the following: whether the specified file exists, whether the specified directory exists, whether the attributes of the program file meet the specified conditions (such as message digest MD5 Whether it is a specified value), whether the specified registry key exists, whether the specified registry key exists, whether the content of the registry key meets the specified condition, whether the content of the registry key meets the specified condition (such as whether it contains or is equal to a specific string or a certain value), whether the specified process exists, whether the specified service exists, and whether the specified service meets the specified conditions (such as whether it is a specific service name, a specific service description, or a specific display name), etc.
服务器端在第一指示器212生成第一扫描内容指示之后,就将该第一扫描内容指示通过第二传输接口218传输至客户端设备100中的第一传输接口118。After the first pointer 212 generates the first scan content indication, the server transmits the first scan content indication to the first transmission interface 118 in the client device 100 through the second transmission interface 218 .
然后,位于客户端设备100中的扫描设备110的第一传输接口118,将接收到的服务器端设备200至少基于系统环境信息判断得到的第一扫描内容指示告知第一扫描器114。进而,第一扫描器114对第一扫描内容指示中的指定位置进行扫描。前面提到,第一扫描内容指示可以是附条件的指示,或者称为扫描条件,那么第一扫描器114需要先判断是否满足第一扫描内容指示所附带的扫描条件,比如前面提到的那些可选条件。当第一扫描器114判断满足第一扫描内容附带的条件时,才对第一扫描内容指示中的指定位置进行扫描。当然,如果第一扫描内容指示不是附条件的指示,则第一扫描器114就无需先判断,直接按照第一扫描内容中指示的扫描位置扫描即可。Then, the first transmission interface 118 of the scanning device 110 located in the client device 100 notifies the first scanner 114 of the received first scanning content indication determined by the server device 200 at least based on the system environment information. Furthermore, the first scanner 114 scans the specified position in the first scan content indication. As mentioned above, the first scan content indication can be a conditional indication, or called a scan condition, then the first scanner 114 needs to first judge whether the scan conditions attached to the first scan content indication are satisfied, such as those mentioned above Optional conditions. When the first scanner 114 judges that the conditions attached to the first scanning content are satisfied, it scans the specified position indicated in the first scanning content. Of course, if the first scan content indication is not conditional, the first scanner 114 does not need to make a judgment first, and can directly scan according to the scan position indicated in the first scan content.
可选的,第一扫描器114除了按照第一扫描内容指示在客户端设备100中进行个性化的扫描外,第一扫描器114还可以对客户端设备100本地引擎内置的扫描位置进行常规扫描。Optionally, in addition to performing a personalized scan in the client device 100 according to the first scan content instruction, the first scanner 114 can also perform a regular scan on the built-in scan location of the local engine of the client device 100 .
在第一扫描器114完成扫描之后就会发现未知程序文件,然后提取未知程序文件的特征数据,特征数据可以有很多种,比如下述信息中的一种或多种:对未知程序文件的全部或部分关键内容(即从文件中抽取一部分内容)根据特定的算法(如MD5、SHA1或其他算法)计算出的数据以及文件名等。程序文件的这些特征数据,可以理解为是程序文件的基本属性信息。第一扫描器114在获得未知程序文件的特征数据后,就将未知程序文件的特征数据通过第一传输接口118传输至服务器端设备200中的第二传输接口218。Unknown program files will be found after the first scanner 114 completes the scan, and then the characteristic data of the unknown program files are extracted. There can be many kinds of characteristic data, such as one or more of the following information: Or part of the key content (that is, a part of the content extracted from the file) is calculated according to a specific algorithm (such as MD5, SHA1 or other algorithms) and the file name. The characteristic data of the program file can be understood as the basic attribute information of the program file. After the first scanner 114 obtains the characteristic data of the unknown program file, it transmits the characteristic data of the unknown program file to the second transmission interface 218 in the server-end device 200 through the first transmission interface 118 .
进而,服务器端的第二传输接口218将收到的未知程序文件的特征数据提供给第一匹配器214,第一匹配器214据此在已知的恶意程序查杀数据库中进行匹配,在该数据库中记录有恶意程序的一些特征信息,此外还可以记录判断是否为恶意程序的判断逻辑,以及可能的查杀方法(如修复逻辑)等。其中,恶意程序的特征可以包括很多信息,比如文件名、程序文件的摘要、文件大小、签名信息、版本信息等文件的属性信息,再比如还可以包括文件所在目录、注册表中的启动位置、同目录下或指定目录下其他文件的属性等程序文件的上下文环境属性。因为现有恶意程序比较复杂,往往单纯通过一两个特征无法准确判断是否为恶意程序,很多情况下需要根据多种特征综合判断,这种综合判断未知程序文件是否为恶意程序的逻辑就是前述的判断逻辑。查杀方法包括但不限于扫描/判定和修复操作。由于服务器端的存储量、运算量以及收集恶意程序特征信息的能力、更新速度都远远强于客户端,因此,当客户端设备100根据本地引擎无法判断的未知程序文件,服务器端设备200就可以根据已知的数据库判断出来。Furthermore, the second transmission interface 218 on the server side provides the characteristic data of the received unknown program file to the first matcher 214, and the first matcher 214 performs matching in the database of known malicious program killings accordingly. Some characteristic information of the malicious program is recorded in , in addition, the judgment logic for judging whether it is a malicious program, and possible killing methods (such as repair logic) can also be recorded. Among them, the characteristics of malicious programs can include a lot of information, such as file name, program file summary, file size, signature information, version information and other file attribute information. For example, it can also include the directory where the file is located, the startup location in the registry, The context environment attributes of program files such as the attributes of other files in the same directory or in the specified directory. Because the existing malicious programs are relatively complex, it is often impossible to accurately judge whether they are malicious programs based on only one or two features. In many cases, it is necessary to make a comprehensive judgment based on multiple features. The logic of this comprehensive judgment of whether an unknown program file is a malicious program is the aforementioned judgment logic. Killing methods include but are not limited to scan/judgment and repair operations. Since the server-side storage capacity, calculation capacity, ability to collect malicious program feature information, and update speed are far stronger than those of the client, therefore, when the client device 100 cannot determine an unknown program file based on the local engine, the server-side device 200 can Judging from known databases.
如果第一匹配器214在已知的恶意程序查杀数据库中匹配成功,即能够判断该未知程序文件是否为恶意程序,可选的,某些情况还可以匹配出对应的修复逻辑,则可以将判断结果和对应的修复逻辑通过第二传输接口218反馈给客户端设备100的第一传输接口118。可选的,客户端设备100还包括查杀器,客户端设备100中的第一传输接口118将服务器端设备200基于未知程序文件的特征判断出其是否为恶意程序的判断结果和修复逻辑告知查杀器,查杀器执行对应的操作。比如,如果判断结果发现该未知程序文件是恶意程序,则查杀器根据服务器端设备200返回的修复逻辑对未知程序文件进行修复处理。修复处理包括但不限于删除指定的注册表键/值、修改注册表键/值为指定内容、删除指定系统服务项、修复/删除指定程序文件等。If the first matcher 214 successfully matches in the known malicious program killing database, it can judge whether the unknown program file is a malicious program. Optionally, in some cases, it can also match the corresponding repair logic. The judgment result and corresponding repair logic are fed back to the first transmission interface 118 of the client device 100 through the second transmission interface 218 . Optionally, the client device 100 also includes a killing device, and the first transmission interface 118 in the client device 100 notifies the server device 200 of the judging result and repair logic of whether the unknown program file is a malicious program based on the characteristics of the unknown program file. The anti-killer, the anti-killer executes the corresponding operation. For example, if the judgment result finds that the unknown program file is a malicious program, the anti-virus device repairs the unknown program file according to the repair logic returned by the server device 200 . Repair processing includes, but is not limited to, deleting specified registry keys/values, modifying registry keys/values with specified content, deleting specified system service items, repairing/deleting specified program files, etc.
具体到修复指定程序文件,则根据需要修复的文件类型不同有多种修复方案。比如,有些需要修复的是系统文件,有些是常用软件的程序文件,有些是一般的文件。修复这些程序文件的基本原理类似,通常都是服务器端根据客户端需要修复的程序文件的一些属性信息,在云端数据库中进行匹配,查找是否有匹配的未感染病毒的程序文件,如果有,就提供给客户端进行替换,从而完成修复。不同文件在具体匹配时可以根据实际需要设置不同的匹配条件,比如如果是系统文件,可以要求文件的各种属性信息(如文件名称、版本信息等)全部一致,才算匹配成功,即成功找到用于修复的替换文件;而对于非系统的一般文件,如果云端数据库中存储的是基本版本或者是标准版本,则也可以认为匹配成功。此外,即便同样是系统文件,或者同样是非系统的一般文件,也可以根据文件的实际应用环境不同、要求不同、或者是操作系统不同而设置不同的匹配条件。比如,可能某种系统文件,就需要文件名称、版本信息等各种属性全部一致才算匹配成功,但另一种系统文件,只需要文件名称一致、版本为基本版本或标准版本,就可以认为是匹配成功。When it comes to repairing specified program files, there are many repair schemes depending on the type of files to be repaired. For example, some of the files that need to be repaired are system files, some are program files of commonly used software, and some are general files. The basic principle of repairing these program files is similar. Usually, the server side performs matching in the cloud database according to some attribute information of the program files to be repaired by the client to find out whether there are matching program files that are not infected with viruses. Provided to the client for replacement, thus completing the repair. When matching different files, different matching conditions can be set according to actual needs. For example, if it is a system file, you can require that the various attribute information of the file (such as file name, version information, etc.) Replacement files for repair; and for non-system general files, if the basic version or standard version is stored in the cloud database, the matching can also be considered successful. In addition, even if they are also system files or non-system general files, different matching conditions can be set according to different actual application environments, different requirements, or different operating systems of the files. For example, a system file may be matched only if all attributes such as the file name and version information are consistent for a certain system file. is a successful match.
下面再给以一种常用软件被木马破坏为例,详细说明修复过程中如何对程序文件进行替换。例如,木马破坏了某种常用软件的程序文件后,原程序文件的信息已经不可用了。这种情况下服务器端设备200通过客户端设备100之前提供的有关该软件的信息,如软件名称,版本,程序文件的版本、目录等,就可以知道需要为客户端设备100提供哪些替换文件,进而根据文件名称、版本等信息在云端数据库中进行匹配,找出未感染病毒并且匹配的替换文件提供给客户端设备100,然后客户端设备100将服务器端设备200提供的未感染病毒、与本机一致的程序文件,替换原来被破坏的程序文件即可。Let's take a commonly used software damaged by a Trojan horse as an example to describe in detail how to replace the program file during the repair process. For example, after a Trojan horse destroys a program file of a certain commonly used software, the information of the original program file is no longer available. In this case, the server device 200 can know which replacement files need to be provided for the client device 100 through the information about the software provided by the client device 100 before, such as software name, version, version of the program file, directory, etc. And then according to information such as file name, version, carry out matching in the cloud database, find out the replacement file that is not infected with the virus and match and provide to the client device 100, then the client device 100 compares the non-infected virus provided by the server device 200 with this Just replace the original damaged program file with the program file consistent with the machine.
如果第一匹配器214在已知的恶意程序查杀数据库中未能匹配成功,即根据未知程序文件的特征数据无法准确匹配,则会通知第二指示器216,进而第二指示器216根据未知程序文件的特征数据提供的基本信息以及已知新生恶意程序的特性,继续生成第二扫描内容指示。因为通过第一指示器已经知道了未知程序文件的特征数据等基本属性信息,然后再结合当前恶意程序的特性,比如这类未知程序文件如果是恶意程序,一般还具有哪些特性,比如该未知程序文件的签名信息可能不是指定名称、该未知程序文件所在目录或相关目录下的其他文件属性可能是指定属性等。If the first matcher 214 fails to match successfully in the known malicious program killing database, that is, it cannot be accurately matched according to the characteristic data of the unknown program file, it will notify the second indicator 216, and then the second indicator 216 will be based on the unknown program file. Based on the basic information provided by the characteristic data of the program file and the characteristics of known emerging malicious programs, the second scanning content indication is continuously generated. Because the basic attribute information such as the characteristic data of the unknown program file has been known through the first indicator, and then combined with the characteristics of the current malicious program, for example, if this type of unknown program file is a malicious program, what characteristics do it generally have, such as the unknown program The signature information of the file may not be the specified name, and other file attributes in the directory where the unknown program file is located or related directories may be specified attributes, etc.
具体而言,第二扫描内容指示包括对未知程序文件的指定属性和/或未知程序文件的上下文环境的指定属性进行扫描。例如,第二扫描内容指示可以仅要求客户端设备100扫描未知程序文件的指定属性并上报,也可以仅要求客户端设备100扫描未知程序文件的上下文环境的指定属性并上报,还可以要求客户端设备100将其他指定属性和上下文环境的指定属性一并上报。Specifically, the second scanning content indication includes scanning the specified attribute of the unknown program file and/or the specified attribute of the context environment of the unknown program file. For example, the second scanning content instruction may only require the client device 100 to scan and report the specified attribute of the unknown program file, or may only require the client device 100 to scan and report the specified attribute of the context environment of the unknown program file, or may require the client device 100 to scan and report the specified attribute of the unknown program file. The device 100 reports other specified attributes together with the specified attributes of the context environment.
应当注意,未知程序文件的指定属性包括但不限于下述信息中的一种或多种:特征数据、文件大小、安全级别、签名信息以及版本信息等。需要说明的是,虽然此前客户端设备100根据服务器端的第一扫描内容指示扫描后已经上报过未知程序文件的特征数据这一基本属性了,但是由于客户端设备100和服务器端设备200可能不是长连接,因此后续客户端设备100在根据服务器端第二扫描内容指示扫描后上报未知程序文件的指定属性信息时,有可能还需要再将未知程序文件的特征数据等基本信息再上报一次。因此第二扫描内容指示中,可能既有要求扫描并上报未知程序文件特征数据以外的其他指定属性的内容,又有要求扫描并上报未知程序文件特征数据的内容。当然,如果客户端设备100和服务器端设备200之间是长连接,那么第二扫描内容指示中也可以不要求客户端设备100再上报一次曾经上报过的未知程序文件的特征数据等基本信息。安全级别包括但不限于恶意(即属于黑名单)、安全(即属于白名单、可信)、未知以及可疑等。未知程序文件的上下文环境的属性包括但不限于下述信息中的一种或多种:未知程序文件所在目录的信息、指定注册表键值的信息、与所述未知程序文件同目录或指定目录下的其他文件的属性信息、以及指定进程的运行状态等。It should be noted that the specified attributes of the unknown program file include but are not limited to one or more of the following information: feature data, file size, security level, signature information, and version information. It should be noted that although the client device 100 has previously reported the basic attribute of characteristic data of unknown program files after scanning according to the first scan content on the server side, the client device 100 and the server device 200 may not have long Therefore, when the subsequent client device 100 reports the specified attribute information of the unknown program file after scanning according to the second scanning content instruction of the server, it may need to report the basic information such as the characteristic data of the unknown program file again. Therefore, in the second scanning content indication, there may be content requiring to scan and report other specified attributes other than characteristic data of unknown program files, and content requiring to scan and report characteristic data of unknown program files. Of course, if there is a persistent connection between the client device 100 and the server device 200, then the second scanning content instruction may not require the client device 100 to report the basic information such as the characteristic data of the previously reported unknown program file. The security level includes but is not limited to malicious (that is, belongs to the blacklist), safe (that is, belongs to the whitelist and is trusted), unknown, and suspicious. The attributes of the context environment of the unknown program file include but are not limited to one or more of the following information: information about the directory where the unknown program file is located, information about the specified registry key value, the same directory as the unknown program file or a specified directory Attribute information of other files under , as well as the running status of the specified process, etc.
第二指示器216在生成第二扫描内容指示后,通过第二传输接口218传输至客户端设备100中的第一传输接口118,进而第一传输接口118再将第二扫描内容指示通知第二扫描器116。第二扫描器116再根据第二扫描内容指示对未知程序文件的指定属性信息和/或上下文环境的属性信息进行扫描,最后将扫描结果传输至服务器端设备200的第二传输接口218。After the second pointer 216 generates the second scanning content indication, it transmits to the first transmission interface 118 in the client device 100 through the second transmission interface 218, and then the first transmission interface 118 notifies the second scanning content indication to the second scanner 116 . The second scanner 116 then scans the specified attribute information of the unknown program file and/or the attribute information of the context environment according to the second scanning content instruction, and finally transmits the scanning result to the second transmission interface 218 of the server-end device 200 .
在本发明的一个实施例中,第二传输接口218将接收到的第二扫描器116提供的扫描结果再告知第二指示器216,进而第二指示器216据此在已知的恶意程序查杀数据库中进行分析比对,前面已经给出过恶意程序查杀数据库的具体内容,由此可知,因为此次客户端设备100提供的未知程序文件的扫描结果包含了更多的信息,比如包含了未知程序文件的签名信息、安全级别、版本信息等其他属性,或者包含了未知程序文件的上下文环境的各种属性信息,再或者未知程序文件的其他属性和上下文环境的属性都扫描到了,那么第二指示器216就可以根据这些更全面的信息,以及恶意程序查杀数据库中的特征信息及判断逻辑进一步分析判断该未知程序文件是否为恶意程序文件,如果判断是恶意程序还可以进一步查看是否有对应的修复逻辑。修复逻辑包括但不限于下述逻辑中的一种或多种:删除指定的注册表键和/或键值、修改注册表键和/或键值为指定内容、删除指定系统服务项以及修复或删除指定程序文件。In one embodiment of the present invention, the second transmission interface 218 notifies the second indicator 216 of the received scanning result provided by the second scanner 116, and then the second indicator 216 searches for known malicious programs accordingly. Analysis and comparison in the anti-virus database. The specific content of the anti-malicious program database has been given above. It can be seen from this that because the scanning result of the unknown program file provided by the client device 100 contains more information, such as containing The signature information, security level, version information and other attributes of the unknown program file, or various attribute information of the context environment of the unknown program file, or other attributes of the unknown program file and the attributes of the context environment are all scanned, then The second indicator 216 can further analyze and judge whether the unknown program file is a malicious program file based on these more comprehensive information, and the characteristic information and judgment logic in the malicious program killing database, if it is judged to be a malicious program, it can further check whether There is a corresponding repair logic. Repair logic includes, but is not limited to, one or more of the following logic: delete specified registry keys and/or key values, modify registry keys and/or key values to specified content, delete specified system service items, and repair or Delete the specified program file.
进而,第二指示器216通过第二传输接口218将未知程序文件是否为恶意程序文件的判断结果传输至客户端设备100。进一步,如果判断结果是恶意程序,并且在已知的恶意程序查杀数据库中能够找到匹配的修复逻辑,则也将匹配的修复逻辑通过第二传输接口218传输至客户端设备。Furthermore, the second indicator 216 transmits the judgment result of whether the unknown program file is a malicious program file to the client device 100 through the second transmission interface 218 . Further, if the judging result is a malicious program, and the matching repair logic can be found in the known malicious program killing database, then the matching repair logic is also transmitted to the client device through the second transmission interface 218 .
客户端的扫描设备110还包括第一处理器,第一处理器通过第一传输接口118获得服务器端设备200中第二指示器提供的未知程序文件是否为恶意程序文件的判断结果,并根据该判断结果进行相应的处理。比如,如果判断结果是安全的程序文件,则不用再对未知程序文件进行查杀处理;如果判断结果是恶意程序,并且第二指示器216提供了修复逻辑,则可以提示用户,并询问用户是否进行修复,在得到用户的确认后根据该修复逻辑对未知程序文件进行修复处理。The scanning device 110 of the client further includes a first processor, the first processor obtains the judgment result of whether the unknown program file provided by the second indicator in the server device 200 is a malicious program file through the first transmission interface 118, and according to the judgment result The results are processed accordingly. For example, if the judging result is a safe program file, then there is no need to check and kill the unknown program file; if the judging result is a malicious program, and the second indicator 216 provides repair logic, the user can be prompted and asked whether Repairing is performed, and the unknown program file is repaired according to the repairing logic after confirmation from the user.
在本发明的另一个实施例中,为了减少客户端设备100和服务器端设备200之间的通信,第二指示器216还可以在将第二扫描内容指示告知客户端设备100的同时,将与第二扫描内容指示相关的判断逻辑,甚至与判断逻辑相关的修复逻辑一起发送给客户端设备100。具体而言,因为第二扫描内容指示主要包括对未知程序文件的特征数据以外的其他指定属性和/或未知程序文件的上下文环境的指定属性进行扫描,因此服务器端可以预知客户端设备100按照第二扫描内容指示扫描后可能会得到哪些扫描结果,然后根据恶意程序查杀数据库可以判断出什么样的扫描结果表明该未知程序文件是恶意程序,因此可以查找出与第二扫描内容指示相关的判断逻辑,即如何根据后续的扫描结果判断出该未知程序文件是否是恶意程序。如果是恶意程序,则还可以进一步根据已知的恶意程序查杀数据库查找是否有与上述第二扫描内容指示、判断逻辑相关的修复逻辑。In another embodiment of the present invention, in order to reduce the communication between the client device 100 and the server device 200, the second indicator 216 may also communicate with The second scan content indicates the relevant judgment logic, and even the repair logic related to the judgment logic is sent to the client device 100 . Specifically, because the second scanning content indication mainly includes scanning other specified attributes other than the feature data of the unknown program file and/or the specified attribute of the context environment of the unknown program file, the server can predict that the client device 100 will follow the specified attribute of the unknown program file. The second scanning content indicates which scanning results may be obtained after scanning, and then according to the malicious program killing database, it can be judged what kind of scanning results indicate that the unknown program file is a malicious program, so the judgment related to the second scanning content indication can be found Logic, that is, how to determine whether the unknown program file is a malicious program according to the subsequent scanning results. If it is a malicious program, it may further check whether there is repair logic related to the above-mentioned second scanning content indication and judgment logic according to the known malicious program killing database.
处于客户端的扫描设备110还可以包括第二处理器,第二处理器通过传输接口118获得服务器端第二指示器216提供的与第二扫描内容指示相关的判断逻辑,然后根据该判断逻辑以及第二扫描器116按照第二扫描内容指示扫描后得到的扫描结果,判断该未知程序文件是否为恶意程序,并进行相应的处理。比如,如果判断结果为该未知程序文件是恶意程序,并且服务器端的第二指示器216还发送了与判断逻辑相关的修复逻辑,则可以在第二扫描器116提供的扫描结果满足该修复逻辑时,根据该修复逻辑进行相应的修复处理。其余处理的具体内容与上个实施例中第一处理器做所的相应处理类似,不再赘述。可以看出在这个实施例中,第二扫描器116就不再需要将按照第二扫描内容指示对未知程序文件进行扫描后的结果上传到服务器端设备了,而是直接提供给第二处理器即可。The scanning device 110 on the client side may also include a second processor, the second processor obtains the judgment logic related to the second scan content indication provided by the second indicator 216 on the server side through the transmission interface 118, and then according to the judgment logic and the first The second scanner 116 judges whether the unknown program file is a malicious program according to the scanning result obtained after scanning according to the second scanning content instruction, and performs corresponding processing. For example, if it is judged that the unknown program file is a malicious program, and the second indicator 216 on the server side also sends repair logic related to the judgment logic, then the scanning result provided by the second scanner 116 may satisfy the repair logic , and perform corresponding repair processing according to the repair logic. The specific content of the rest of the processing is similar to the corresponding processing performed by the first processor in the previous embodiment, and will not be repeated here. It can be seen that in this embodiment, the second scanner 116 no longer needs to upload the result of scanning the unknown program file according to the second scanning content instruction to the server device, but directly provides it to the second processor That's it.
通过上述实施例可以看出,如果扫描设备110只包括环境信息读取器112、第一扫描器114、第二扫描器116以及第一传输接口,则其为单纯的恶意程序扫描设备,如果还包括第一处理器或第二处理器,则该扫描设备本质上是能够完成恶意程序查杀的设备,可以理解为是用于恶意程序的查杀设备。It can be seen from the above embodiments that if the scanning device 110 only includes the environment information reader 112, the first scanner 114, the second scanner 116 and the first transmission interface, then it is a pure malicious program scanning device. Including the first processor or the second processor, the scanning device is essentially a device capable of scanning and killing malicious programs, which can be understood as a scanning and killing device for malicious programs.
请参阅图2,其示出了根据本发明一个实施例的基于云安全的恶意程序扫描方法流程图。该方法包括位于客户端侧的一部分流程,还包括位于服务器端侧的一部分流程,在客户端侧的流程即为用于恶意程序查杀的扫描方法,在服务器端侧的流程即为用于恶意程序查杀的云端管理方法。Please refer to FIG. 2 , which shows a flowchart of a method for scanning malicious programs based on cloud security according to an embodiment of the present invention. The method includes a part of the process on the client side and a part of the process on the server side. The process on the client side is a scanning method for checking and killing malicious programs, and the process on the server side is a scanning method for malicious programs. A cloud management method for program killing.
该方法始于步骤S210,在S210中读取客户端设备当前的系统环境信息,并传输至服务器端设备。系统环境信息包括但不限于操作系统的版本信息、系统补丁安装信息、软件安装信息、驱动安装信息以及活动进程和服务信息等信息中的任意一种或多种。本步骤可以通过前述扫描设备110中的环境信息读取器112来实现,相关的技术实现可以参考前述环境信息读取器112在各实施例中的相关描述,此处不再赘述。The method starts with step S210, in which the current system environment information of the client device is read and transmitted to the server device. System environment information includes, but is not limited to, any one or more of operating system version information, system patch installation information, software installation information, driver installation information, and active process and service information. This step can be implemented by the aforementioned environmental information reader 112 in the scanning device 110 , and related technical implementations can refer to the related descriptions of the aforementioned environmental information reader 112 in various embodiments, which will not be repeated here.
然后,在步骤S220中服务器端设备获得客户端设备的系统环境信息,根据新生恶意程序的特性和客户端设备传输的系统环境信息生成第一扫描内容指示,该第一扫描内容指示至少包括对指定位置的内容进行扫描并告知扫描到的未知程序文件的特征数据,以及将该第一扫描内容指示传输至客户端设备。本步骤可以通过前述位于服务器端的云端管理设备210中的第一指示器212实现,相关技术实现也请参考第一指示器212在前述各实施例中的描述,此处不再赘述。Then, in step S220, the server-side device obtains the system environment information of the client device, and generates a first scan content indication according to the characteristics of the new malicious program and the system environment information transmitted by the client device, and the first scan content indication includes at least the specified The content of the location is scanned and the characteristic data of the scanned unknown program file is notified, and the indication of the first scanned content is transmitted to the client device. This step can be implemented through the aforementioned first indicator 212 in the cloud management device 210 located at the server side. For related technical implementation, please refer to the descriptions of the first indicator 212 in the aforementioned embodiments, and details will not be repeated here.
客户端设备在通过步骤S220获得服务器端设备基于其上传的系统环境信息判断的第一扫描内容指示之后,在步骤S230中对第一扫描内容指示中的指定位置进行扫描,并至少将扫描得到的未知程序文件的特征数据再传输至服务器端设备,以便服务器端设备据此进行进一步的判断。本步骤可以通过位于客户端的扫描设备110中的第一扫描器114予以实现,相关技术实现也请参考第一扫描器114在前述各实施例中的描述,此处不再赘述。After the client device obtains the first scan content indication judged by the server-side device based on the uploaded system environment information in step S220, it scans the specified position in the first scan content indication in step S230, and at least scans the obtained The feature data of the unknown program file is then transmitted to the server-side device, so that the server-side device can make further judgments based on it. This step can be implemented by the first scanner 114 located in the scanning device 110 of the client. For the implementation of related technologies, please refer to the description of the first scanner 114 in the foregoing embodiments, which will not be repeated here.
服务器端设备在通过步骤S230获得客户端设备传输的未知程序文件的特征数据之后,在步骤S240中根据未知程序文件的特征数据在已知的恶意程序查杀数据库中进行匹配,判断该未知程序文件是否为恶意程序。如果匹配成功,判断出该未知程序文件是恶意程序,则还可以进一步查找是否有对应的修复逻辑,如果有,则可以将判断结果和修复逻辑一并传输至客户端;如果没有找到对应的修复逻辑,则可以只将判断结果传输至客户端设备。本步骤可以通过前述位于服务器端的云端管理设备210中的第一匹配器214实现,相关技术实现也请参考第一匹配器214在前述各实施例中的描述,此处不再赘述。After the server-side device obtains the characteristic data of the unknown program file transmitted by the client device through step S230, in step S240, according to the characteristic data of the unknown program file, it is matched in the known malicious program killing database to judge the unknown program file Is it a malicious program. If the matching is successful, it is judged that the unknown program file is a malicious program, then you can further search whether there is a corresponding repair logic, if there is, you can transmit the judgment result and repair logic to the client; if no corresponding repair logic is found logic, then only the judgment result can be transmitted to the client device. This step can be implemented by the aforementioned first matching unit 214 in the cloud management device 210 located at the server side. For related technical implementations, please refer to the descriptions of the first matching unit 214 in the aforementioned embodiments, which will not be repeated here.
如果服务器端设备根据已知的恶意程序查杀数据库无法匹配到已知记录,即无法判断该未知程序文件是否是恶意程序,则在步骤S250中生成第二扫描内容指示,第二扫描内容指示包括对未知程序文件的指定属性和/或未知程序文件的上下文环境的指定属性进行扫描,然后将第二扫描内容指示传输至客户端设备。可以看出,服务器端设备之所以还要向客户端设备发送第二扫描内容指示,是为了获得更多的未知程序文件相关的信息,以便做更进一步的判断。本步骤可以通过前述位于服务器端的云端管理设备210中的第二指示器216实现,相关技术实现也请参考第一指示器212在前述各实施例中的描述,此处不再赘述。If the server-side device cannot match a known record according to the known malicious program killing database, that is, it cannot determine whether the unknown program file is a malicious program, then in step S250, a second scan content indication is generated, and the second scan content indication includes Scan the specified attribute of the unknown program file and/or the specified attribute of the context environment of the unknown program file, and then transmit the second scan content indication to the client device. It can be seen that the reason why the server device still sends the second scanning content indication to the client device is to obtain more information related to unknown program files for further judgment. This step can be implemented through the aforementioned second indicator 216 in the cloud management device 210 located at the server side. For related technical implementations, please refer to the descriptions of the first indicator 212 in the aforementioned embodiments, which will not be repeated here.
客户端设备在通过步骤S250获得第二扫描内容指示后,在步骤S260中根据第二扫描内容指示进行扫描,从而获知未知程序文件的指定属性和/或未知程序文件的上下文环境的指定属性。例如,未知程序文件的指定属性包括但不限于下述信息中的一种或多种:未知程序文件的特征数据、文件大小、安全级别、签名信息以及版本信息等。再例如,未知程序文件的上下文环境的属性包括但不限于下述信息中的一种或多种:未知程序文件所在目录的信息、注册表中的启动位置的信息、与该程序文件同目录或指定目录下的其他文件的属性信息、以及指定进程的运行状态等。After obtaining the second scanning content indication in step S250, the client device scans according to the second scanning content indication in step S260, so as to obtain the specified attribute of the unknown program file and/or the specified attribute of the context environment of the unknown program file. For example, the specified attributes of the unknown program file include but are not limited to one or more of the following information: feature data, file size, security level, signature information, and version information of the unknown program file. For another example, the attributes of the context environment of the unknown program file include but are not limited to one or more of the following information: information about the directory where the unknown program file is located, information about the startup location in the registry, information about the same directory as the program file, or Attribute information of other files in the specified directory, and the running status of the specified process, etc.
在步骤S260之后,在本发明的一个实施例中,首先客户端设备将按照第二扫描内容指示进行扫描后的扫描结果传输至服务器端设备,该步骤可以通过前述各实施例中的第二扫描器116执行,相关技术特征可以参看该部件的描述,此处不再赘述;进而服务器端设备获得客户端设备按照第二扫描内容指示扫描获得的扫描结果之后,根据这个扫描结果在已经的恶意程序查杀数据库中进一步分析比对,再次判断未知程序文件是否为恶意程序,然后将判断结果(如恶意、安全、未知、可疑)、和/或、与该扫描结果匹配的修复逻辑传输至客户端设备。服务器端执行该步骤可以通过前述各实施例中的云端管理设备210中的第二指示器216予以执行,相关技术特征可以参看该部件的描述,此处不再赘述。应当注意的是,不是所有判断出是恶意程序的情况下都能找到对应的修复逻辑,所以在找到的情况下,判断结果和修复逻辑可以一起传输至客户端设备;在没找到修复逻辑的情况下,可以只将判断结果传输至客户端供其或用户参考;还有可能只传输修复逻辑,因为客户端收到修复逻辑即可理解为未知程序文件就是恶意程序,否则服务器端设备不会向其反馈针对该未知程序文件的修复逻辑。在客户端设备获得服务器端设备反馈的未知程序文件是否为恶意程序的判断结果之后,便可以根据该判断结果进行相应的处理。比如,通过弹窗等安全提醒手段提醒用户,或者在用户确认后根据修复逻辑进行修复处理。客户端设备执行该步骤可以通过前述各实施例中扫描设备110中的第一处理器执行,相关技术特征可以参看该部件的描述,此处不再赘述。After step S260, in one embodiment of the present invention, firstly, the client device transmits the scan result after scanning according to the second scan content instruction to the server device, and this step can be performed through the second scan in the foregoing embodiments. The relevant technical features can refer to the description of this component, and will not be repeated here; furthermore, after the server-side device obtains the scan result obtained by the client device according to the second scan content instruction, it will scan the malicious program according to the scan result. Further analyze and compare in the killing database, judge again whether the unknown program file is a malicious program, and then transmit the judgment result (such as malicious, safe, unknown, suspicious) and/or the repair logic matching the scanning result to the client equipment. Executing this step on the server side can be performed through the second indicator 216 in the cloud management device 210 in the foregoing embodiments. For related technical features, please refer to the description of this component, which will not be repeated here. It should be noted that not all cases where a malicious program is judged to be a malicious program can find the corresponding repair logic, so if found, the judgment result and repair logic can be transmitted to the client device together; if no repair logic is found In this case, only the judgment result can be transmitted to the client for its or the user’s reference; it is also possible to transmit only the repair logic, because the client can understand that the unknown program file is a malicious program after receiving the repair logic, otherwise the server device will not send Its feedback is for the repair logic of the unknown program file. After the client device obtains the judging result of whether the unknown program file fed back by the server device is a malicious program, it can perform corresponding processing according to the judging result. For example, remind the user through security reminders such as pop-up windows, or perform repair processing according to the repair logic after the user confirms. The client device may execute this step through the first processor in the scanning device 110 in the foregoing embodiments. For related technical features, please refer to the description of this component, which will not be repeated here.
从这个实施例后续步骤描述可以看出,客户端设备需要向服务器端设备至少传输两次扫描结果,以便服务器端设备根据扫描结果做判断。为了减少客户端设备和服务器端设备之间的通信次数,提高效率,还可以在本发明又一个实施例中采用下述流程处理。It can be seen from the description of the subsequent steps in this embodiment that the client device needs to transmit the scan results to the server device at least twice, so that the server device can make a judgment based on the scan results. In order to reduce the number of communications between the client device and the server device and improve efficiency, the following process may also be used in another embodiment of the present invention.
在本发明的又一个实施例中,在前述步骤S250中,服务器端设备除了生成第二扫描内容指示并发送至客户端设备之外,服务器端设备还根据已知的恶意程序查杀数据库获得与第二扫描内容指示相关的判断逻辑和/或修复逻辑,然后将判断逻辑和/或修复逻辑以及第二扫描内容指示一起传输至客户端设备。该步骤可以通过前述各实施例的云端管理设备210中的第二指示器216予以实现,相关技术实现可以参考该部件的相关描述,此处不再赘述。可以看出,在步骤S250之后,客户端设备至少已经接收到了第二扫描内容指示和与第二扫描内容指示相关的判断逻辑,还有可能也一并接收到了与第二扫描内容指示相关修复逻辑,因此客户端设备在通过步骤S260按照第二扫描内容指示进行扫描获得扫描结果之后,客户端设备就可以根据服务器端设备传输的与第二扫描内容指示相关的判断逻辑以及扫描结果,判断该未知程序文件是否为恶意程序,如果是,进一步检测服务器端设备是否还同时传输了相关修复逻辑,如果有则继续根据修复逻辑对未知程序文件进行修复处理,比如删除指定的注册表键和/或键值、修改注册表键和/或键值为指定内容、删除指定系统服务项,以及修复或删除指定程序文件等。该步骤可以通过前面各实施例的扫描设备110中的第二处理器予以执行,相关技术实现可以参考前述该步骤的相关描述,此处不再赘述。In yet another embodiment of the present invention, in the aforementioned step S250, in addition to generating the second scanning content instruction and sending it to the client device, the server device also scans and kills the database according to known malicious programs to obtain and The second scan content indicates related judgment logic and/or repair logic, and then transmits the judgment logic and/or repair logic together with the second scan content indication to the client device. This step can be implemented through the second indicator 216 in the cloud management device 210 of the above-mentioned embodiments, and related technical implementation can refer to the relevant description of this component, and will not be repeated here. It can be seen that after step S250, the client device has at least received the second scan content indication and the judgment logic related to the second scan content indication, and may also have received the repair logic related to the second scan content indication. , so after the client device scans according to the second scan content instruction to obtain the scan result in step S260, the client device can judge the unknown Whether the program file is a malicious program, if so, further check whether the server-side device also transmits relevant repair logic at the same time, if so, continue to repair the unknown program file according to the repair logic, such as deleting the specified registry key and/or key value, modify registry keys and/or key values to specified content, delete specified system service items, and repair or delete specified program files, etc. This step can be executed by the second processor in the scanning device 110 of the above embodiments, and related technical implementation can refer to the relevant description of the above step, which will not be repeated here.
在本发明的又一个实施例中,给出了一种基于云安全的恶意程序查杀方法,请参阅图3所示流程图。In yet another embodiment of the present invention, a method for checking and killing malicious programs based on cloud security is provided, please refer to the flowchart shown in FIG. 3 .
该流程始于步骤S310,客户端初始化本地引擎和网络环境。The process begins with step S310, the client initializes the local engine and network environment.
然后,执行步骤S320,客户端读取系统环境信息发送给服务器端。Then, step S320 is executed, the client reads the system environment information and sends it to the server.
进而,执行步骤S330,服务器端根据客户端的系统环境信息与预置的扫描内容的条件进行判断,把需要扫描的内容发送给客户端。此处需要扫描的内容就相当于前述各实施例中的第一扫描内容指示。Furthermore, step S330 is executed, the server side makes a judgment according to the system environment information of the client side and the preset scanning content conditions, and sends the content to be scanned to the client side. The content to be scanned here is equivalent to the first scan content indication in the foregoing embodiments.
然后执行步骤S340,客户端执行本地引擎内置的扫描内容和服务器端返回的扫描内容,获得未知程序文件的特征,比如文件名、MD5或者SHA等。Then execute step S340, the client executes the scan content built in the local engine and the scan content returned by the server to obtain the characteristics of the unknown program file, such as file name, MD5 or SHA.
然后执行步骤S350,客户端设备把未知程序文件的特征发送给服务器端。Then step S350 is executed, the client device sends the characteristics of the unknown program file to the server.
此后,执行步骤S360,服务器端根据程序文件的特征和/或程序文件的上下文环境的属性在数据库中进行查找。Thereafter, step S360 is executed, and the server searches the database according to the characteristics of the program file and/or the attributes of the context environment of the program file.
然后进入步骤S370,判断是否在数据库中发现匹配记录,即是否找到对应的查杀方法,包括但不限于扫描/判定动作和修复动作。如果找到匹配记录,则执行步骤S380;如果没有找到匹配记录,则执行步骤S400。Then enter step S370, judge whether to find matching records in the database, that is, whether to find the corresponding killing method, including but not limited to scanning/judgment action and repair action. If a matching record is found, execute step S380; if no matching record is found, execute step S400.
步骤S380:服务器端把对应的查杀方法返回至客户端。然后执行步骤S390。Step S380: the server returns the corresponding killing method to the client. Then step S390 is executed.
步骤S390:客户端根据服务器端返回的查杀方法执行相应动作。然后结束。Step S390: the client performs corresponding actions according to the killing method returned by the server. Then it's over.
步骤S400:服务器端判断是否需要进一步检查客户端未知程序文件的其他属性,比如步骤S350反馈过的未知程序文件特征以外的其他属性,和/或未知程序文件的上下文环境的属性等。如果是,则继续执行步骤S410,;如果否,则直接结束。Step S400: the server determines whether to further check other attributes of the unknown program file of the client, such as attributes other than the features of the unknown program file fed back in step S350, and/or attributes of the context of the unknown program file. If yes, proceed to step S410; if no, end directly.
步骤S410:客户端根据服务器端返回的检查条件收集需要的程序文件的指定属性和其上下文环境的属性,然后发送给服务器端。然后返回执行步骤S360,直到流程结束。Step S410: The client collects the required specified attributes of the program file and the attributes of its context environment according to the inspection conditions returned by the server, and then sends them to the server. Then return to step S360 until the process ends.
在本发明的又一个实施例中,给出了一个恶意程序查杀的具体实例。例如某影音软件xxxUpdate.exe会加载同目录下xxxUpdate.dll,该影音软件在中国是一款安装量非常大的软件,但没有对自身的程序文件做足够的保护和防篡改检查,所以恶意程序m可以利用该影音软件的这个安全漏洞,把xxxUpdate.dll替换为恶意程序。采用本方案的检测和查杀步骤如下:In yet another embodiment of the present invention, a specific example of checking and killing malicious programs is given. For example, an audio-visual software xxxUpdate.exe will load xxxUpdate.dll in the same directory. This audio-visual software is a software with a very large amount of installations in China, but it has not done enough protection and anti-tampering checks for its own program files, so malicious programs m can take advantage of this security hole in the audio-visual software to replace xxxUpdate.dll with a malicious program. The detection and killing steps of this solution are as follows:
首先,客户端把xxxUpdate.dll的文件名和MD5值发送给服务器端;First, the client sends the file name and MD5 value of xxxUpdate.dll to the server;
然后,服务器端根据文件名和MD5值匹配到有对应的查杀方法,于是进一步向客户端发出扫描指示(相当于前述各实施例中的第二扫描内容指示)、判断逻辑和修复逻辑。其中,扫描指示中要求检查是此文件的安全级别是否为可信,文件的公司签名名称是不是“北京xxx有限公司”;判断逻辑中指明如果此文件的安全级别不为可信、且公司签名名称不是“北京xxx有限公司”,则判断该文件遭恶意程序篡改,是恶意程序;对应的修复逻辑中指出如果扫描结果满足判断逻辑,判断该文件是恶意程序,则对应的修复动作是禁止xxxUpdate.exe随系统启动,并把xxxUpdate.dll替换为原版文件。Then, the server end matches the file name and MD5 value to find that there is a corresponding killing method, so it further sends a scanning instruction (equivalent to the second scanning content instruction in the foregoing embodiments), judgment logic and repair logic to the client. Among them, the scan instruction requires checking whether the security level of this file is trusted, and whether the company signature name of the file is "Beijing xxx Co., Ltd."; the judgment logic indicates that if the security level of this file is not trusted, and the company signature If the name is not "Beijing xxx Co., Ltd.", it is judged that the file has been tampered with by a malicious program and is a malicious program; the corresponding repair logic points out that if the scan result satisfies the judgment logic and the file is judged to be a malicious program, the corresponding repair action is to prohibit xxxUpdate The .exe starts with the system and replaces xxxUpdate.dll with the original file.
最后,客户端根据上面的扫描内容对该文件进行扫描,并且根据扫描结果以及服务器端提供的判断逻辑判断该文件是否为恶意程序,如果是,则把恶意程序报告给用户,当用户选择清除时执行服务器端返回的查杀动作,比如修复处理。Finally, the client scans the file according to the above scanning content, and judges whether the file is a malicious program according to the scanning result and the judgment logic provided by the server. If so, the malicious program is reported to the user. When the user chooses to clear Execute the killing action returned by the server, such as repair processing.
在本发明的另一个实施例中,客户端设备并不向服务器端设备上报当前的系统环境信息,进而服务器端也就不需要根据客户端设备上报的系统环境信息生成第一扫描内容指示,然后让客户端上设备根据第一扫描内容指示进行扫描。取而代之的是,客户端设备直接根据已知的扫描逻辑(比如本地引擎的扫描逻辑或者此前服务器端告知的扫描逻辑)进行扫描,然后直接将扫描得到的无法判断是否安全的可疑的未知程序文件上报至服务器端设备,其余的处理过程就与前述各实施例中描述的一样,故不再赘述。In another embodiment of the present invention, the client device does not report the current system environment information to the server device, and the server does not need to generate the first scan content indication according to the system environment information reported by the client device, and then Let the device on the client end scan according to the first scanning content instruction. Instead, the client device scans directly according to the known scanning logic (such as the scanning logic of the local engine or the scanning logic notified by the server before), and then directly reports the suspicious unknown program files that cannot be judged whether they are safe or not. To the server-side device, other processing procedures are the same as those described in the foregoing embodiments, so details are not repeated here.
通过前述本发明提供的各个实施例可以看出,本发明实施例在仅通过可疑的未知程序文件的文件名、MD5、SHA等无法判断是否为恶意程序或者无法找到准确的修复方案时,可以再通过要求客户端设备进一步扫描未知程序文件的签名、版本等其他属性和/或未知程序文件的上下文环境的属性来做进一步判断,从而能更准确的判断出客户端自己无法确定是否安全的未知程序文件。由于采用这种方案,无论是客户端将进一步扫描的各种属性结果发送到服务器端来判断,还是服务器端直接将与扫描结果相关的判断逻辑、修复逻辑一并发送给客户端,让其自己判断,本质都是云端服务器及时下发个性化的扫描内容,并根据程序文件的属性及其所在上下文环境的属性从服务器端动态获取查杀方法,避免了通过升级本地特征库和引擎程序才能检测和清除新生恶意程序,从而加快了对新生恶意程序的打击速度,有效地遏制了其快速蔓延。It can be seen from the various embodiments provided by the foregoing invention that in the embodiment of the invention, when it is impossible to judge whether it is a malicious program or not to find an accurate repair solution only through the file name, MD5, SHA, etc. of the suspicious unknown program file, it can be used again. Further judgments can be made by requiring the client device to further scan the signature, version and other attributes of the unknown program file and/or the attributes of the context of the unknown program file, so that the unknown program that the client cannot determine whether it is safe or not can be more accurately judged document. Due to the adoption of this scheme, no matter whether the client sends the various attribute results of further scanning to the server for judgment, or the server directly sends the judgment logic and repair logic related to the scanning results to the client, let itself Judgment, the essence is that the cloud server sends personalized scanning content in a timely manner, and dynamically obtains the killing method from the server side according to the attributes of the program file and the attributes of the context environment, avoiding the need to upgrade the local feature library and engine program to detect And remove new malicious programs, thereby speeding up the attack on new malicious programs, effectively curbing their rapid spread.
在此提供的算法和显示不与任何特定计算机、虚拟系统或者其它设备固有相关。各种通用系统也可以与基于在此的示教一起使用。根据上面的描述,构造这类系统所要求的结构是显而易见的。此外,本发明也不针对任何特定编程语言。应当明白,可以利用各种编程语言实现在此描述的本发明的内容,并且上面对特定语言所做的描述是为了披露本发明的最佳实施方式。The algorithms and displays presented herein are not inherently related to any particular computer, virtual system, or other device. Various generic systems can also be used with the teachings based on this. The structure required to construct such a system is apparent from the above description. Furthermore, the present invention is not specific to any particular programming language. It should be understood that various programming languages can be used to implement the content of the present invention described herein, and the above description of specific languages is for disclosing the best mode of the present invention.
在此处所提供的说明书中,说明了大量具体细节。然而,能够理解,本发明的实施例可以在没有这些具体细节的情况下实践。在一些实例中,并未详细示出公知的方法、结构和技术,以便不模糊对本说明书的理解。In the description provided herein, numerous specific details are set forth. However, it is understood that embodiments of the invention may be practiced without these specific details. In some instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure the understanding of this description.
类似地,应当理解,为了精简本公开并帮助理解各个发明方面中的一个或多个,在上面对本发明的示例性实施例的描述中,本发明的各个特征有时被一起分组到单个实施例、图、或者对其的描述中。然而,并不应将该公开的方法解释成反映如下意图:即所要求保护的本发明要求比在每个权利要求中所明确记载的特征更多的特征。更确切地说,如下面的权利要求书所反映的那样,发明方面在于少于前面公开的单个实施例的所有特征。因此,遵循具体实施方式的权利要求书由此明确地并入该具体实施方式,其中每个权利要求本身都作为本发明的单独实施例。Similarly, it should be appreciated that in the foregoing description of exemplary embodiments of the invention, in order to streamline this disclosure and to facilitate an understanding of one or more of the various inventive aspects, various features of the invention are sometimes grouped together in a single embodiment, figure, or its description. This method of disclosure, however, is not to be interpreted as reflecting an intention that the claimed invention requires more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive aspects lie in less than all features of a single foregoing disclosed embodiment. Thus, the claims following the Detailed Description are hereby expressly incorporated into this Detailed Description, with each claim standing on its own as a separate embodiment of this invention.
本领域那些技术人员可以理解,可以对实施例中的设备中的模块进行自适应性地改变并且把它们设置在与该实施例不同的一个或多个设备中。可以把实施例中的模块或单元或组件组合成一个模块或单元或组件,以及此外可以把它们分成多个子模块或子单元或子组件。除了这样的特征和/或过程或者单元中的至少一些是相互排斥之外,可以采用任何组合对本说明书(包括伴随的权利要求、摘要和附图)中公开的所有特征以及如此公开的任何方法或者设备的所有过程或单元进行组合。除非另外明确陈述,本说明书(包括伴随的权利要求、摘要和附图)中公开的每个特征可以由提供相同、等同或相似目的的替代特征来代替。Those skilled in the art can understand that the modules in the device in the embodiment can be adaptively changed and arranged in one or more devices different from the embodiment. Modules or units or components in the embodiments may be combined into one module or unit or component, and furthermore may be divided into a plurality of sub-modules or sub-units or sub-assemblies. All features disclosed in this specification (including accompanying claims, abstract and drawings) and any method or method so disclosed may be used in any combination, except that at least some of such features and/or processes or units are mutually exclusive. All processes or units of equipment are combined. Each feature disclosed in this specification (including accompanying claims, abstract and drawings) may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise.
此外,本领域的技术人员能够理解,尽管在此所述的一些实施例包括其它实施例中所包括的某些特征而不是其它特征,但是不同实施例的特征的组合意味着处于本发明的范围之内并且形成不同的实施例。例如,在下面的权利要求书中,所要求保护的实施例的任意之一都可以以任意的组合方式来使用。Furthermore, those skilled in the art will understand that although some embodiments described herein include some features included in other embodiments but not others, combinations of features from different embodiments are meant to be within the scope of the invention. and form different embodiments. For example, in the following claims, any one of the claimed embodiments may be used in any combination.
本发明的各个部件实施例可以以硬件实现,或者以在一个或者多个处理器上运行的软件模块实现,或者以它们的组合实现。本领域的技术人员应当理解,可以在实践中使用微处理器或者数字信号处理器(DSP)来实现根据本发明实施例的用于恶意程序查杀的扫描设备或云端管理设备中的一些或者全部部件的一些或者全部功能。本发明还可以实现为用于执行这里所描述的方法的一部分或者全部的设备或者装置程序(例如,计算机程序和计算机程序产品)。这样的实现本发明的程序可以存储在计算机可读介质上,或者可以具有一个或者多个信号的形式。这样的信号可以从因特网网站上下载得到,或者在载体信号上提供,或者以任何其他形式提供。The various component embodiments of the present invention may be implemented in hardware, or in software modules running on one or more processors, or in a combination thereof. Those skilled in the art should understand that a microprocessor or a digital signal processor (DSP) can be used in practice to implement some or all of the scanning device or cloud management device for malicious program killing according to the embodiment of the present invention Some or all of the features of the component. The present invention can also be implemented as an apparatus or an apparatus program (for example, a computer program and a computer program product) for performing a part or all of the methods described herein. Such a program for realizing the present invention may be stored on a computer-readable medium, or may be in the form of one or more signals. Such a signal may be downloaded from an Internet site, or provided on a carrier signal, or provided in any other form.
应该注意的是上述实施例对本发明进行说明而不是对本发明进行限制,并且本领域技术人员在不脱离所附权利要求的范围的情况下可设计出替换实施例。在权利要求中,不应将位于括号之间的任何参考符号构造成对权利要求的限制。单词“包含”不排除存在未列在权利要求中的元件或步骤。位于元件之前的单词“一”或“一个”不排除存在多个这样的元件。本发明可以借助于包括有若干不同元件的硬件以及借助于适当编程的计算机来实现。在列举了若干装置的单元权利要求中,这些装置中的若干个可以是通过同一个硬件项来具体体现。单词第一、第二、以及第三等的使用不表示任何顺序。可将这些单词解释为名称。It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and that those skilled in the art will be able to design alternative embodiments without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of elements or steps not listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. The invention can be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In a unit claim enumerating several means, several of these means can be embodied by one and the same item of hardware. The use of the words first, second, and third, etc. does not indicate any order. These words can be interpreted as names.
本文公开了A1、一种用于恶意程序查杀的扫描设备,包括:第一传输接口,被配置为向服务器端设备传输信息,以及接收所述服务器端设备传输的信息;环境信息读取器,被配置为读取所述客户端设备当前的系统环境信息,并通过所述第一传输接口传输至所述服务器端设备;第一扫描器,被配置为通过所述第一传输接口获得所述服务器端设备至少基于所述系统环境信息判断的第一扫描内容指示,并对所述第一扫描内容指示中的指定位置进行扫描,以及至少将扫描得到的未知程序文件的特征数据通过所述第一传输接口传输至所述服务器端设备;以及第二扫描器,被配置为通过所述第一传输接口获得所述服务器端设备传输的第二扫描内容指示,所述第二扫描内容指示包括对所述未知程序文件的指定属性和/或所述未知程序文件的上下文环境的指定属性进行扫描,以及根据所述第二扫描内容指示进行扫描。A2、根据A1所述的扫描设备,所述第二扫描器还被配置为将按照所述第二扫描内容指示进行扫描后的扫描结果,通过所述第一传输接口传输至所述服务器端设备;所述扫描设备还包括:第一修复器,被配置为通过所述第一传输接口获得所述服务器端设备基于所述第二扫描器提供的扫描结果确定的修复逻辑,以及根据所述修复逻辑对所述未知程序文件进行修复处理。A3、根据A1所述的扫描设备,还包括:第二修复器,被配置为通过所述第一传输接口获得来自服务器端设备的、与所述第二扫描内容指示一起传输的与所述第二扫描内容指示相关的修复逻辑,当所述第二扫描器的扫描结果满足所述修复逻辑时,对所述未知程序文件进行修复处理。A4、根据A2或A3所述的扫描设备,所述修复处理包括下述处理方式中的一种或多种:删除指定的注册表键和/或键值、修改注册表键和/或键值为指定内容、删除指定系统服务项,以及修复或删除指定程序文件。A5、根据A1至A4中任一项所述的扫描设备,所述环境系统信息包括下述信息中的一种或多种:操作系统的版本信息、系统补丁安装信息、软件安装信息、驱动安装信息以及系统中正在运行的进程和服务信息。A6、根据A1至A5中任一项所述的扫描设备:所述程序文件的特征数据包括下述信息中的一种或多种:对所述未知程序文件的全部或部分关键内容采用特定算法获得的数据、文件名;所述未知程序文件的指定属性包括下述信息中的一种或多种:特征数据、文件大小、安全级别、签名信息以及版本信息。A7、根据A1至A6中任一项所述的扫描设备,所述未知程序文件的上下文环境的属性包括下述信息中的一种或多种:所述未知程序文件所在目录的信息、注册表中的启动位置的信息、与所述程序文件同目录或指定目录下的其他文件的属性信息、指定进程的运行状态。This paper discloses A1, a scanning device for scanning and killing malicious programs, including: a first transmission interface configured to transmit information to a server-side device and receive information transmitted by the server-side device; an environment information reader , configured to read the current system environment information of the client device, and transmit it to the server device through the first transmission interface; the first scanner, configured to obtain the system environment information through the first transmission interface The server-end device at least based on the first scan content indication judged by the system environment information, scans the specified position in the first scan content indication, and at least passes the feature data of the unknown program file obtained through the scan through the The first transmission interface is transmitted to the server-end device; and the second scanner is configured to obtain a second scan content indication transmitted by the server-end device through the first transmission interface, and the second scan content indication includes Scan the specified attribute of the unknown program file and/or the specified attribute of the context environment of the unknown program file, and scan according to the second scanning content instruction. A2. According to the scanning device described in A1, the second scanner is further configured to transmit the scanning result after scanning according to the second scanning content instruction to the server-end device through the first transmission interface The scanning device further includes: a first repairer, configured to obtain the repair logic determined by the server-side device based on the scanning result provided by the second scanner through the first transmission interface, and according to the repair The logic repairs the unknown program file. A3. The scanning device according to A1, further comprising: a second restorer, configured to obtain, through the first transmission interface, the information transmitted together with the second scanning content indication from the server-side device and the second scanning content indication. The second scan content indicates related repair logic, and when the scanning result of the second scanner satisfies the repair logic, the unknown program file is repaired. A4. According to the scanning device described in A2 or A3, the repair process includes one or more of the following processing methods: delete the specified registry key and/or key value, modify the registry key and/or key value Specify content, delete specified system service items, and repair or delete specified program files. A5. According to the scanning device described in any one of A1 to A4, the environmental system information includes one or more of the following information: version information of the operating system, system patch installation information, software installation information, driver installation information and information about processes and services running on the system. A6. The scanning device according to any one of A1 to A5: the feature data of the program file includes one or more of the following information: a specific algorithm is used for all or part of the key content of the unknown program file The obtained data, file name; the specified attribute of the unknown program file includes one or more of the following information: characteristic data, file size, security level, signature information and version information. A7. According to the scanning device described in any one of A1 to A6, the attribute of the context environment of the unknown program file includes one or more of the following information: information of the directory where the unknown program file is located, the registry Information about the starting location in the program file, attribute information of other files in the same directory as the program file or in the specified directory, and the running status of the specified process.
本文公开了B8、一种用于恶意程序查杀的云端管理设备,包括:第二传输接口,被配置为向客户端设备传输信息,以及接收所述客户端设备传输的信息;第一指示器,被配置为根据新生恶意程序的特性和所述客户端设备传输的系统环境信息生成第一扫描内容指示,所述第一扫描内容指示至少包括对指定位置的内容进行扫描并告知扫描到的未知程序文件的特征数据,以及通过所述第二传输接口将所述第一扫描内容指示传输至所述客户端设备;第一匹配器,被配置为通过所述第二传输接口获得所述客户端设备传输的所述未知程序文件的特征数据,并据此在已知的恶意程序特征数据记录中进行匹配;以及第二指示器,被配置为当所述第一匹配器未能匹配到已知记录时生成第二扫描内容指示,所述第二扫描内容指示包括对所述未知程序文件的指定属性和/或所述未知程序文件的上下文环境的指定属性进行扫描,并通过所述第二传输接口传输至所述客户端设备。B9、根据B8所述的云端管理设备:所述第二指示器还被配置为通过所述第二传输接口获得所述客户端设备按照所述第二扫描内容指示扫描后得到的扫描结果,并据此判断所述未知程序文件是否为恶意程序,并将判断结果通过所述第二传输接口传输至所述客户端设备;或者,所述第二指示器还被配置为将与所述第二扫描内容指示相关的判断逻辑一起通过所述第二传输接口传输至所述客户端设备,所述判断逻辑是用以判断所述未知程序文件是否为恶意程序的逻辑。B10、根据B9所述的云端管理设备,所述第二指示器还被配置为根据所述客户端设备按照所述第二扫描内容指示扫描后得到的扫描结果,在已知的恶意程序查杀数据库中进行匹配,如果查找到与所述扫描结果匹配的修复逻辑,则通过所述第二传输接口传输给客户端设备;或者,所述第二指示器还被配置为根据所述第二扫描内容指示在已知的恶意程序查杀数据库中进行匹配,将匹配到的与所述第二扫描内容指示相关的修复逻辑和所述第二扫描内容指示一起通过所述第二传输接口传输至所述客户端设备。B11、根据B8至B10中任一项所述的云端管理设备,所述新生恶意程序的特性包括:新生恶意程序利用特定位置进行隐藏和/或攻击的特征信息。B12、根据B8至B11中任一项所述的云端管理设备,所述第一扫描内容指示是附条件的指示,所述条件包括下述内容中的一种或多种:指定文件是否存在、指定目录是否存在、程序文件的属性是否满足指定条件、指定注册表键是否存在、指定注册表键值是否存在、注册表键的内容是否满足指定条件、注册表键值的内容是否满足指定条件、指定进程是否存在以及指定服务是否存在。B13、根据B8至B12中任一项所述的云端管理设备,所述修复逻辑包括下述逻辑中的一种或多种:删除指定的注册表键和/或键值、修改注册表键和/或键值为指定内容、删除指定系统服务项以及修复或删除指定程序文件。B14、根据B8至B13中任一项所述的云端管理设备,所述未知程序文件的特征数据包括下述信息中的一种或多种:对所述未知程序文件的全部或部分关键内容采用特定算法获得的数据、文件名;所述未知程序文件的指定属性包括下述信息中的一种或多种:特征数据、文件大小、签名信息以及版本信息。B15、根据B8至B14中任一项所述的云端管理设备,所述未知程序文件的上下文环境的属性包括下述信息中的一种或多种:所述未知程序文件所在目录的信息、安全级别信息、注册表中的启动位置的信息、与所述程序文件同目录或指定目录下的其他文件的属性信息、指定进程的运行状态。This article discloses B8, a cloud management device for malicious program detection and killing, including: a second transmission interface configured to transmit information to a client device and receive information transmitted by the client device; a first indicator , configured to generate a first scan content indication according to the characteristics of the new malicious program and the system environment information transmitted by the client device, the first scan content indication at least includes scanning the content of a specified location and notifying the scanned unknown feature data of the program file, and transmit the first scanned content instruction to the client device through the second transmission interface; the first matcher is configured to obtain the client device through the second transmission interface The feature data of the unknown program file transmitted by the device, and matching is performed in the known malicious program feature data record; and the second indicator is configured to when the first matcher fails to match the known generating a second scanning content indication during recording, the second scanning content indication includes scanning the specified attribute of the unknown program file and/or the specified attribute of the context environment of the unknown program file, and passing the second transmission interface to the client device. B9. The cloud management device according to B8: the second indicator is further configured to obtain the scan result obtained by the client device after scanning according to the second scan content instruction through the second transmission interface, and Based on this, it is judged whether the unknown program file is a malicious program, and the judgment result is transmitted to the client device through the second transmission interface; or, the second indicator is further configured to communicate with the second The judgment logic related to the scanning content indication is transmitted to the client device through the second transmission interface together, the judgment logic is the logic used to judge whether the unknown program file is a malicious program. B10. According to the cloud management device described in B9, the second indicator is further configured to scan and kill known malicious programs according to the scan results obtained after the client device scans according to the second scan content instruction Matching is performed in the database, and if a repair logic matching the scanning result is found, it is transmitted to the client device through the second transmission interface; or, the second indicator is also configured to The content indication is matched in the known malicious program killing database, and the matched repair logic related to the second scanning content indication and the second scanning content indication are transmitted to the computer via the second transmission interface. the client device described above. B11. According to the cloud management device described in any one of B8 to B10, the characteristics of the new malicious program include: feature information that the new malicious program uses a specific location to hide and/or attack. B12. According to the cloud management device described in any one of B8 to B11, the first scan content indication is a conditional indication, and the conditions include one or more of the following: whether the specified file exists, Whether the specified directory exists, whether the attributes of the program file meet the specified conditions, whether the specified registry key exists, whether the specified registry key value exists, whether the content of the registry key meets the specified condition, whether the content of the registry key meets the specified condition, Whether the specified process exists and whether the specified service exists. B13. According to the cloud management device described in any one of B8 to B12, the repair logic includes one or more of the following logics: delete the specified registry key and/or key value, modify the registry key and /or the key value is the specified content, deletes the specified system service item, and repairs or deletes the specified program file. B14. According to the cloud management device described in any one of B8 to B13, the feature data of the unknown program file includes one or more of the following information: all or part of the key content of the unknown program file is adopted The data obtained by a specific algorithm, the file name; the specified attribute of the unknown program file includes one or more of the following information: feature data, file size, signature information, and version information. B15. According to the cloud management device described in any one of B8 to B14, the attributes of the context of the unknown program file include one or more of the following information: information about the directory where the unknown program file is located, security Level information, information about the starting location in the registry, attribute information of other files in the same directory as the program file or under the specified directory, and the running status of the specified process.
本文公开了C16、一种基于云安全的恶意程序扫描系统,包括如A1至A7中任一项所述的用于恶意程序查杀的扫描设备,以及如B8至B15中任一项所述的用于恶意程序查杀的云端管理设备。This paper discloses C16, a malicious program scanning system based on cloud security, including the scanning device for killing malicious programs as described in any one of A1 to A7, and the scanning device as described in any one of B8 to B15 A cloud-based management device for malicious program scanning and killing.
本文公开了D17、一种用于恶意程序查杀的扫描方法,包括:读取客户端设备当前的系统环境信息,并传输至服务器端设备;获得所述服务器端设备基于所述系统环境信息判断的第一扫描内容指示,并对所述第一扫描内容指示中的指定位置进行扫描,以及至少将扫描得到的未知程序文件的特征数据传输至所述服务器端设备;以及获得所述服务器端设备传输的第二扫描内容指示,所述第二扫描内容指示包括对所述未知程序文件的指定属性和/或所述未知程序文件的上下文环境的指定属性进行扫描,以及根据所述第二扫描内容指示进行扫描。D18、根据D17所述的扫描方法,还包括:将按照所述第二扫描内容指示进行扫描后的扫描结果传输至服务器端设备;获得所述服务器端设备基于该扫描结果确定的所述未知程序文件是否为恶意程序的判断结果,并根据所述判断结果进行相应的处理;或者,获得所述服务器端设备告知的与所述第二扫描内容指示相关的判断逻辑,并根据按照第二扫描内容指示进行扫描后的扫描结果和所述判断逻辑确定所述未知程序文件是否为恶意程序,以及进行相应的处理。This article discloses D17, a scanning method for killing malicious programs, including: reading the current system environment information of the client device and transmitting it to the server device; obtaining the server device's judgment based on the system environment information The first scan content indication of the first scan content indication, and scan the specified position in the first scan content indication, and at least transmit the characteristic data of the unknown program file obtained by scanning to the server-end device; and obtain the server-end device The transmitted second scanning content indication, the second scanning content indication includes scanning the specified attribute of the unknown program file and/or the specified attribute of the context environment of the unknown program file, and according to the second scanning content Indicates to scan. D18. The scanning method according to D17, further comprising: transmitting the scanning result after scanning according to the second scanning content instruction to the server-end device; obtaining the unknown program determined by the server-end device based on the scanning result Whether the file is a judgment result of a malicious program, and perform corresponding processing according to the judgment result; or, obtain the judgment logic related to the second scanning content indication notified by the server-end device, and according to the second scanning content Instruct the scanning result after scanning and the judging logic to determine whether the unknown program file is a malicious program, and perform corresponding processing.
本文公开了E19、一种用于恶意程序查杀的云端管理方法,包括:根据新生恶意程序的特性和客户端设备传输的系统环境信息生成第一扫描内容指示,所述第一扫描内容指示至少包括对指定位置的内容进行扫描并告知扫描到的未知程序文件的特征数据,以及将所述第一扫描内容指示传输至所述客户端设备;获得所述客户端设备传输的所述未知程序文件的特征数据,并据此在已知的恶意程序查杀数据库中进行匹配;以及当根据所述未知程序文件的特征数据未能匹配到已知记录时,生成第二扫描内容指示,所述第二扫描内容指示包括对所述未知程序文件的指定属性和/或所述未知程序文件的上下文环境的指定属性进行扫描,并将所述第二扫描内容指示传输至所述客户端设备。E20、根据E19所述的云端管理方法,还包括:获得所述客户端设备按照所述第二扫描内容指示扫描后获得的扫描结果,并据此判断所述未知程序文件是否为恶意程序,将判断结果和/或与所述扫描结果匹配的修复逻辑传输至所述客户端设备;或者,将与所述第二扫描内容指示相关的判断逻辑和/或修复逻辑,与所述第二扫描内容指示一起传输至所述客户端设备。This paper discloses E19, a cloud management method for scanning and killing malicious programs, including: generating a first scanning content indication according to the characteristics of the new malicious program and the system environment information transmitted by the client device, the first scanning content indication is at least Including scanning the content of the specified location and notifying the feature data of the scanned unknown program file, and transmitting the first scanned content instruction to the client device; obtaining the unknown program file transmitted by the client device feature data of the unknown program file, and accordingly perform matching in the known malicious program scanning and killing database; and when the feature data of the unknown program file fails to match a known record, generate a second scan content indication, the first The second scanning content indication includes scanning the specified attribute of the unknown program file and/or the specified attribute of the context environment of the unknown program file, and transmitting the second scanning content indication to the client device. E20. The cloud management method according to E19, further comprising: obtaining the scan result obtained by the client device after scanning according to the second scan content instruction, and judging accordingly whether the unknown program file is a malicious program, and The judgment result and/or the repair logic matching the scan result are transmitted to the client device; or, the judgment logic and/or repair logic related to the second scan content indication are combined with the second scan content Instructions are transmitted to the client device together.
本文公开了F21、一种基于云安全的恶意程序扫描方法,包括:客户端设备读取当前的系统环境信息,并传输至服务器端设备;服务器端设备根据新生恶意程序的特性和所述客户端设备传输的系统环境信息生成第一扫描内容指示,所述第一扫描内容指示至少包括对指定位置的内容进行扫描并告知扫描到的未知程序文件的特征数据,以及将所述第一扫描内容指示传输至所述客户端设备;所述客户端设备根据所述第一扫描内容指示进行扫描,并至少将扫描得到的未知程序文件的特征数据传输至所述服务器端设备;所述服务器端设备根据所述未知程序文件的特征数据在已知的恶意程序查杀数据库中进行匹配;当根据所述未知程序文件的特征数据未能匹配到已知记录时,所述服务器端设备生成第二扫描内容指示,所述第二扫描内容指示包括对所述未知程序文件的指定属性和/或所述未知程序文件的上下文环境的指定属性进行扫描,并将所述第二扫描内容指示传输至所述客户端设备;所述客户端设备根据所述第二扫描内容指示进行扫描。This article discloses F21, a malicious program scanning method based on cloud security, including: the client device reads the current system environment information and transmits it to the server device; The system environment information transmitted by the device generates a first scan content indication, the first scan content indication at least includes scanning the content of the specified location and notifying the characteristic data of the scanned unknown program file, and the first scan content indication transmitted to the client device; the client device scans according to the first scanning content instruction, and at least transmits the characteristic data of the unknown program file obtained through scanning to the server device; The feature data of the unknown program file is matched in the known malicious program killing database; when the feature data of the unknown program file fails to match a known record, the server-side device generates a second scanning content Instructing that the second scan content indication includes scanning a specified attribute of the unknown program file and/or a specified attribute of the context environment of the unknown program file, and transmitting the second scan content indication to the client terminal device; the client device scans according to the second scanning content instruction.
Claims (17)
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210506137.5A CN102982284B (en) | 2012-11-30 | 2012-11-30 | For the scanning device of rogue program killing, cloud management equipment and method and system |
PCT/CN2013/088196 WO2014082599A1 (en) | 2012-11-30 | 2013-11-29 | Scanning device, cloud management device, method and system for checking and killing malicious programs |
US14/648,298 US9830452B2 (en) | 2012-11-30 | 2013-11-29 | Scanning device, cloud management device, method and system for checking and killing malicious programs |
US15/823,534 US20180082061A1 (en) | 2012-11-30 | 2017-11-27 | Scanning device, cloud management device, method and system for checking and killing malicious programs |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210506137.5A CN102982284B (en) | 2012-11-30 | 2012-11-30 | For the scanning device of rogue program killing, cloud management equipment and method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102982284A CN102982284A (en) | 2013-03-20 |
CN102982284B true CN102982284B (en) | 2016-04-20 |
Family
ID=47856288
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210506137.5A Active CN102982284B (en) | 2012-11-30 | 2012-11-30 | For the scanning device of rogue program killing, cloud management equipment and method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102982284B (en) |
Families Citing this family (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2014082599A1 (en) * | 2012-11-30 | 2014-06-05 | 北京奇虎科技有限公司 | Scanning device, cloud management device, method and system for checking and killing malicious programs |
CN103390130B (en) * | 2013-07-18 | 2017-04-05 | 北京奇虎科技有限公司 | Based on the method for the rogue program killing of cloud security, device and server |
CN103618626A (en) * | 2013-11-28 | 2014-03-05 | 北京奇虎科技有限公司 | Method and system for generating safety analysis report on basis of logs |
CN103929323A (en) * | 2013-12-16 | 2014-07-16 | 汉柏科技有限公司 | Health degree monitoring method of cloud network equipment |
CN104462975A (en) * | 2014-12-19 | 2015-03-25 | 北京奇虎科技有限公司 | Program scanning method, device and system |
CN104462601B (en) * | 2014-12-31 | 2017-04-12 | 北京奇安信科技有限公司 | File scanning method, device and system |
CN104573518B (en) * | 2015-01-23 | 2019-03-26 | 百度在线网络技术(北京)有限公司 | File scanning method, device, server and system |
TWI547823B (en) * | 2015-09-25 | 2016-09-01 | 緯創資通股份有限公司 | Method and system for analyzing malicious code, data processing apparatus and electronic apparatus |
CN105335191B (en) * | 2015-10-16 | 2019-03-01 | 珠海豹趣科技有限公司 | A kind of method, apparatus and terminal of end of scan equipment |
CN105429956B (en) * | 2015-11-02 | 2018-09-25 | 重庆大学 | Malware detection system based on P2P dynamic clouds and method |
CN106682508B (en) * | 2016-06-17 | 2019-01-11 | 腾讯科技(深圳)有限公司 | The checking and killing method and device of virus |
CN107645483B (en) * | 2016-07-22 | 2021-03-19 | 创新先进技术有限公司 | Risk identification method, risk identification device, cloud risk identification device and system |
CN106682495B (en) * | 2016-11-11 | 2020-01-10 | 腾讯科技(深圳)有限公司 | Safety protection method and safety protection device |
CN110971575B (en) * | 2018-09-29 | 2023-04-18 | 北京金山云网络技术有限公司 | Malicious request identification method and device, electronic equipment and computer storage medium |
CN109829303A (en) * | 2018-12-28 | 2019-05-31 | 北京奇安信科技有限公司 | A kind of Intranet cloud checking and killing method, console and client based on system file |
CN110879887B (en) * | 2019-11-15 | 2022-03-04 | 杭州安恒信息技术股份有限公司 | A mining Trojan program repair method, device, equipment and medium |
CN114115936A (en) * | 2021-10-27 | 2022-03-01 | 安天科技集团股份有限公司 | Method and device for upgrading computer program, electronic equipment and storage medium |
US20240370560A1 (en) * | 2023-05-01 | 2024-11-07 | Crowdstrike, Inc. | Detecting targeted intrusion on mobile devices |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101924762A (en) * | 2010-08-18 | 2010-12-22 | 奇智软件(北京)有限公司 | A proactive defense method based on cloud security |
CN102279912A (en) * | 2011-06-03 | 2011-12-14 | 奇智软件(北京)有限公司 | Client program monitoring method and device and client |
CN102592103A (en) * | 2011-01-17 | 2012-07-18 | 中国电信股份有限公司 | Secure file processing method, equipment and system |
US8302192B1 (en) * | 2008-04-30 | 2012-10-30 | Netapp, Inc. | Integrating anti-virus in a clustered storage system |
CN102799811A (en) * | 2012-06-26 | 2012-11-28 | 腾讯科技(深圳)有限公司 | Scanning method and device |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102750463A (en) * | 2011-12-16 | 2012-10-24 | 北京安天电子设备有限公司 | System and method for improving file rescanning speed |
-
2012
- 2012-11-30 CN CN201210506137.5A patent/CN102982284B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8302192B1 (en) * | 2008-04-30 | 2012-10-30 | Netapp, Inc. | Integrating anti-virus in a clustered storage system |
CN101924762A (en) * | 2010-08-18 | 2010-12-22 | 奇智软件(北京)有限公司 | A proactive defense method based on cloud security |
CN102592103A (en) * | 2011-01-17 | 2012-07-18 | 中国电信股份有限公司 | Secure file processing method, equipment and system |
CN102279912A (en) * | 2011-06-03 | 2011-12-14 | 奇智软件(北京)有限公司 | Client program monitoring method and device and client |
CN102799811A (en) * | 2012-06-26 | 2012-11-28 | 腾讯科技(深圳)有限公司 | Scanning method and device |
Also Published As
Publication number | Publication date |
---|---|
CN102982284A (en) | 2013-03-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102982284B (en) | For the scanning device of rogue program killing, cloud management equipment and method and system | |
CN103034808B (en) | Scan method, equipment and system and cloud management and equipment | |
US9953162B2 (en) | Rapid malware inspection of mobile applications | |
US10176321B2 (en) | Leveraging behavior-based rules for malware family classification | |
CN102483780B (en) | Anti-virus scan | |
KR101693370B1 (en) | Fuzzy whitelisting anti-malware systems and methods | |
CA2770265C (en) | Individualized time-to-live for reputation scores of computer files | |
CN103679031B (en) | A kind of immune method and apparatus of file virus | |
US20180082061A1 (en) | Scanning device, cloud management device, method and system for checking and killing malicious programs | |
RU2573265C2 (en) | Method of detecting false positive results of scanning files for malware | |
CN103473501B (en) | A malware tracking method based on cloud security | |
CN102982121B (en) | A kind of file scanning method, file scanning device and file detection system | |
JP5599892B2 (en) | Malware detection and response to malware using link files | |
CN103207970B (en) | Virus document scan method and device | |
CN104811453B (en) | Active defense method and device | |
CN110826064A (en) | A malicious file processing method, device, electronic device and storage medium | |
US10127382B2 (en) | Malware detection method | |
CN103281325A (en) | Method and device for processing file based on cloud security | |
CN103618626A (en) | Method and system for generating safety analysis report on basis of logs | |
CN107171894A (en) | The method of terminal device, distributed high in the clouds detecting system and pattern detection | |
CN103279707A (en) | Method, device and system for actively defending against malicious programs | |
CN103793649A (en) | Method and device for cloud-based safety scanning of files | |
CN106130966A (en) | A kind of bug excavation detection method, server, device and system | |
CN105791250A (en) | App detection method and device | |
CN115495740A (en) | A virus detection method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20220801 Address after: Room 801, 8th floor, No. 104, floors 1-19, building 2, yard 6, Jiuxianqiao Road, Chaoyang District, Beijing 100015 Patentee after: BEIJING QIHOO TECHNOLOGY Co.,Ltd. Address before: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park) Patentee before: BEIJING QIHOO TECHNOLOGY Co.,Ltd. Patentee before: Qizhi software (Beijing) Co.,Ltd. |
|
TR01 | Transfer of patent right |