Summary of the invention
An object of the present invention is to provide a kind of checking and killing virus method of the whole network terminal, to solve to occupy in the prior art
The problem of space resources is big, and virus base updates not in time.
In some illustrative embodiments, the checking and killing virus method of the whole network terminal, for the Cloud Server of network side,
It include: that the cloud killing engine based on anti-virus signature database is called to scan the terminal device;If scanning doubtful file, identify
The doubtful file, and according to qualification result, judge whether the doubtful file is virus document;If so, will determine result
It is sent to the terminal device, and the virus characteristic of the virus document is published in the anti-virus signature database.
Preferably, the identification doubtful file judges whether the doubtful file is viral text according to qualification result
Part specifically includes: successively carrying out following identification to the doubtful file, determines the doubtful file according to the qualification result
Final score value;Auxiliary identification, multi engine identification, static identification and dynamic are identified;By the final score value and preset disease
Malicious threshold value is compared, and according to comparison result, determines that the doubtful file is virus document or non-viral file.
Preferably, the auxiliary identification, specifically includes: the type of the identification doubtful file, and according to the doubtful text
The type of part pre-processes it, determines whether the digital signature of file after pretreatment is effective, and/or, if contain
Infection type code;If it is determined that result is digital signature in vain or contains infection type code, then the doubtful file is determined as institute
State virus document;Otherwise, subsequent identification is carried out to the doubtful file.
Preferably, in the type of the identification doubtful file, and the type according to the doubtful file carries out it
Pretreatment, comprising: if compressed file, then successively decompress, all subfiles after obtaining decompression;If shell adding file, then according to
Secondary shelling, the original document after obtaining shelling.
Preferably, the multi engine identification, specifically includes: deployment covers document engine, filtered for auxiliary identification
File is scanned, and is allocated the first sub- score value according to scanning result;In conjunction with acquisition the described first sub- score value with it is described
The qualification result of static state identification and dynamic identification, determines the final score value.
Preferably, the static identification, specifically includes: extraction document attribute material, in self-teaching type material database into
The matching of row material, determines whether material is abnormal, determines the second sub- score value according to judgement result;In conjunction with second son point of acquisition
The qualification result of value and multi engine identification and dynamic identification, determines the final score value.
Preferably, in the self-teaching type material database include standard material at least one: system API, importing
Derived table, key compositional character string, file icon, fileversion number, file compiler type, PE file section table, binary system point
Block, instruction jump block, instruction sequence.
Preferably, the dynamic identification, specifically includes: whether there is dangerous row by doubtful file described in virtual machine monitoring
Then to determine the sub- score value of third according to the type of hazardous act;The attack and the infection risk, comprising: all kinds of notes
Enter, mutexes, inline hook, starting host process, mirror image are kidnapped, addition delay renaming item, input method mechanism, modification instruction
Register and remote thread context, setting global message hook, common loophole flooding;In conjunction with the third of acquisition
Sub- score value and the multi engine are identified and the qualification result of static identification, determines the final score value.
Preferably, after the cloud killing engine of the calling based on anti-virus signature database scans the terminal device, also
If including: to scan virus document, the virus document is removed from the terminal device using cloud killing engine removal.
It is another object of the present invention to provide a kind of checking and killing virus devices of the whole network terminal.
In some illustrative embodiments, the checking and killing virus device of the whole network terminal, comprising: calling module, for adjusting
The terminal device is scanned with the cloud killing engine based on anti-virus signature database;Parsing module, if for scanning doubtful file,
It then identifies the doubtful file, and according to qualification result, judges whether the doubtful file is virus document;Sending module is used
In will determine that result is sent to the terminal device, and the virus characteristic of the virus document is published to the virus characteristic number
According in library.
Compared with prior art, illustrative embodiments of the invention includes following advantages:
Terminal side no longer needs to be carried out the killing of virus using the cloud killing engine on network side with virus base is set up, saved
The waste of space resources;And utilize the virus base of virus characteristic real-time update, the safety for the equipment being further ensured that.
Specific embodiment
In the following detailed description, a large amount of specific details are proposed, in order to provide a thorough understanding of the present invention.But
It will be understood by those within the art that implementable present invention without these specific details.In other cases, without detailed
Well-known method, process, component and circuit are carefully described, in order to avoid influence the understanding of the present invention.
As shown in Figure 1, a kind of checking and killing virus method of the whole network terminal is disclosed, the Cloud Server for network side, comprising:
S11, the cloud killing engine based on anti-virus signature database is called to scan the terminal device;
If S12, scanning doubtful file, it is identified, and according to qualification result, judges that the doubtful file is
No is virus document;
S13, if so, will determine that result is sent to the terminal device, and the virus characteristic of the virus document is sent out
Cloth is into the anti-virus signature database.
Terminal calls cloud killing engine to scan the terminal document, and doubtful file, then obtain the doubtful file if it exists, carries out
It is put into data to be tested library, after identifying that the doubtful file is virus document, the virus characteristic of the virus document is put into disease
In malicious property data base.
Terminal side no longer needs to carry out looking into for virus using the cloud killing engine on network side with virus base is set up in the present invention
It kills, saves the waste of space resources;And utilize the virus base of virus characteristic real-time update, the safety for the equipment being further ensured that
Property.
In some illustrative embodiments, the identification doubtful file judges the doubtful text according to qualification result
Whether part is virus document, is specifically included: successively carrying out following identification to the doubtful file, is determined according to the qualification result
The final score value of the doubtful file;Auxiliary identification, multi engine identification, static identification and dynamic are identified;By the final score value
It is compared with preset viral threshold value, according to comparison result, determines the doubtful file for virus document or non-viral
File.
In some illustrative embodiments, the auxiliary identification, specifically includes: the type of the identification doubtful file, and
Type according to the doubtful file pre-processes it;Determine whether the digital signature of file after pretreatment is effective, and/
Or, determining whether file contains infection type code after pretreatment;If it is determined that result is that digital signature is invalid or contain infection type
The doubtful file is then determined as the virus document by file;Otherwise, subsequent identification is carried out to the doubtful file.
In some illustrative embodiments, in the type of the identification doubtful file, and according to the doubtful file
Type it is pre-processed, comprising: (1) if compressed file, then successively decompress, obtain decompression after all subfiles;
(2) it if shell adding file, then successively shells, the original document after obtaining shelling.
In some illustrative embodiments, the multi engine identification, specifically includes: deployment covers document engine, for auxiliary
It helps the filtered file of identification to be scanned, and the first sub- score value is allocated according to scanning result;In conjunction with described the of acquisition
The qualification result of one sub- score value and the static identification and dynamic identification, determines the final score value.
In some illustrative embodiments, the static identification, specifically includes: extraction document attribute material is being learned self
Material matching is carried out in habit type material database, determines whether material is abnormal, and the second sub- score value is determined according to judgement result;In conjunction with acquisition
The described second sub- score value and the multi engine identification and dynamic identify qualification result, determine the final score value.
In some illustrative embodiments, in the self-teaching type material database include standard element at least one
Material: table, key compositional character string, file icon, fileversion number, file compiler type, PE text system API, are imported and exported
Part section table, binary system piecemeal, instruction jump block, instruction sequence.
In some illustrative embodiments, the dynamic identification, specifically includes: by doubtful file described in virtual machine monitoring
With the presence or absence of hazardous act, then the sub- score value of third is determined according to the type of hazardous act;The attack and infection row
For, comprising: all kinds of injections, mutexes, inline hook, starting host process, mirror image is kidnapped, addition postpones renaming item, input
Method mechanism, modification command register and remote thread context, setting global message hook, common loophole flooding;Knot
It closes the sub- score value of the third obtained and the multi engine is identified and the qualification result of static identification, determine the final score value.
In some illustrative embodiments, the end is scanned in the cloud killing engine of the calling based on anti-virus signature database
After end equipment, further includes: if scanning virus document, remove from the terminal device using the cloud killing engine
Except the virus document.
In some illustrative embodiments, the first son that the multi engine identification, static identification and dynamic identify
Score value, the second sub- score value and the sub- score value of third carry out the combination of result by pre-set weighted value.
Such as:
I=aX+bY+cZ
Wherein, I is final score value, and X, Y, Z are respectively the first sub- score value, the second sub- score value and the sub- score value of third, and a, b, c divide
Not Wei the first sub- score value, the second sub- score value and the sub- score value of third weight coefficient,
A+b+c=1.
In some illustrative embodiments, identification can also include:
Special identification δ: refering in particular to a kind of code of points, which relies on a collection of special external factor auxiliary and calculate score value, such as
File size, file range, file path, scanning channel etc..
Such as:
I=aX+bY+cZ+ δ
Wherein, I is final score value, and X, Y, Z are respectively the first sub- score value, the second sub- score value and the sub- score value of third, and a, b, c divide
Not Wei the first sub- score value, the second sub- score value and the sub- score value of third weight coefficient, a+b+c=1.
As shown in Fig. 2, disclosing a kind of checking and killing virus device 100 of the whole network terminal, comprising: call and be based on virus characteristic number
The calling module 101 of the terminal device is scanned according to the cloud killing engine in library;If scanning doubtful file, the doubtful text is identified
Part, and according to qualification result, judge the doubtful file whether be virus document parsing module 102;It will determine that result is sent
The extremely terminal device, and the virus characteristic of the virus document is published to the sending module in the anti-virus signature database
103。
It in some illustrative embodiments, include: below successively being carried out to the doubtful file in the parsing module 102
The identification module 1021 of identification: auxiliary identification, multi engine identification, static identification and dynamic are identified;It is true according to the qualification result
The analyzing sub-module 1022 of the final score value of the fixed doubtful file;By the final score value and preset viral threshold value into
Row compares, and according to comparison result, determines that the doubtful file is virus document or the judgment module 1023 of non-viral file.
In some illustrative embodiments, include: the first identification submodule 10211 in the identification module 1021, be used for
It identifies the type of the doubtful file, and the type according to the doubtful file pre-processes it, determines after pretreatment
File digital signature it is whether effective, and/or, if contain infection type code;If it is determined that result be digital signature it is invalid or
Containing infection type code, then the doubtful file is determined as the virus document;Otherwise, the doubtful file is carried out subsequent
Identification.
In some illustrative embodiments, in the type of the identification doubtful file, and according to the doubtful file
Type it is pre-processed, comprising: if compressed file, then successively decompress, obtain decompression after all subfiles;If
Shell adding file, then successively shell, the original document after obtaining shelling.
In some illustrative embodiments, include: the second identification submodule 10212 in the identification module 1022, be used for
Deployment covers document engine, identifies that filtered file is scanned for auxiliary, and be allocated first according to scanning result
Sub- score value;In conjunction with the described first sub- score value of acquisition and the qualification result of the static identification and dynamic identification, determine described in most
Whole score value.
In some illustrative embodiments, include: third identification submodule 10213 in the identification module 1022, be used for
Extraction document attribute material carries out material matching in self-teaching type material database, determines whether material is abnormal, ties according to judgement
Fruit determines the second sub- score value;The identification knot identified in conjunction with the described second sub- score value of acquisition and the multi engine and dynamically identified
Fruit determines the final score value.
Preferably, in the self-teaching type material database include standard material at least one: system API, importing
Derived table, key compositional character string, file icon, fileversion number, file compiler type, PE file section table, binary system point
Block, instruction jump block, instruction sequence.
In some illustrative embodiments, include: the 4th identification submodule 10214 in the identification module 1022, be used for
It whether there is hazardous act by doubtful file described in virtual machine monitoring, then third point determined according to the type of hazardous act
Value;The attack and the infection risk, comprising: all kinds of injections, mutexes, inline hook, starting host process, mirror image
It kidnaps, addition delay renaming item, input method mechanism, modify command register and remote thread context, setting global message
Hook, common loophole flooding;It is identified in conjunction with the sub- score value of the third of acquisition and multi engine identification and static state
Qualification result determines the final score value.
In some illustrative embodiments, the checking and killing virus module further include: killing module, if for scanning virus
File then removes the virus document using cloud killing engine removal from the terminal device.
The above description of the embodiment is only used to help understand the method for the present invention and its core ideas;Meanwhile for this
The those skilled in the art in field, according to the thought of the present invention, there will be changes in the specific implementation manner and application range,
In conclusion the contents of this specification are not to be construed as limiting the invention.