Unlock instant, AI-driven research and patent intelligence for your innovation.

Program identification method and device based on machine learning

A program identification and machine learning technology, applied in the computer field, can solve problems such as lag and low efficiency in identifying malicious programs, and achieve the effect of improving identification efficiency and saving manpower

Active Publication Date: 2014-03-12
360 TECH GRP CO LTD
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of the present application provides a program identification method and device based on machine learning to solve the problem of low efficiency and lag in identifying malicious programs in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Program identification method and device based on machine learning
  • Program identification method and device based on machine learning
  • Program identification method and device based on machine learning

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0055] see figure 1 , a flow chart of the first embodiment of generating a model for identifying program types for this application:

[0056] Step 101: Input the extracted mass programs, the mass programs include malicious programs and non-malicious programs.

[0057] Step 102: Extract features from each input program, and classify the extracted features.

[0058] Specifically, analyze each program file, extract predefined features from the program file, generate feature vectors according to the extracted features, and the black and white attributes of each feature vector, and compile and generate corresponding The program's compiler type.

[0059]Step 103: According to the result of the classification, different types of features are trained using different decision machines to generate a training model or a training model set for identifying malicious programs.

[0060] Wherein, different decision machines use the same or different methods to train the features, including...

no. 2 example

[0061] see Figure 2A , the flow chart of the second embodiment of generating a model for identifying program types for this application:

[0062] Step 201: Input the extracted mass programs, the mass programs include malicious programs and non-malicious programs.

[0063] Step 202: Analyze each program file, and extract predefined features from the program file.

[0064] Step 203: Generate feature vectors according to the extracted features, and the black and white attributes of each feature vector.

[0065] Different feature categories contain different numbers of specific features. Taking the feature category of compilers as an example, the specific features of compilers that can be included are: VC4, VC5, VC6, VC7, VC8, Delphi, and BC. In the embodiment of the present application, a classification identifier can be assigned to each feature classification, for example, the classification identifier of the compiler is "1", and for each specific compiler feature, a feature ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a program identification method and device based on machine learning. The method comprises the following steps of: analyzing input unknown programs and extracting characteristics of the unknown programs; classifying the unknown programs according to the extracted characteristics; inputting the unknown programs into a generated training model and a corresponding decision-making machine for judging according to a classification result; outputting an identification result of the unknown programs, wherein the identification result is a malicious program or a non-malicious program. According to the invention, a machine learning technology is adopted to analyze a large quantity of program samples to obtain a model for indentifying the malicious programs; with the adoption of the model, a lot of labor power can be saved and the identification efficiency for the malicious programs is improved; on the basis of carrying out data mining on mass programs, inherent laws of the programs can be found out and nonevent malicious programs can be prevented, thereby preventing the malicious program from being not killed.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to a method and device for program recognition based on machine learning. Background technique [0002] Malicious programs are a special class of programs, they usually sneak into the user's computer system without the user's knowledge and authorization, and attack the user's system in an improved manner. Malicious programs may include viruses, backdoor programs, Trojan horse programs, macro viruses, boot sector viruses, script viruses, and the like. Before checking and killing malicious viruses, the malicious program must first be identified. Taking checking and killing viruses as an example, in the prior art, the checking and killing is mainly carried out through character string signatures and simple manual summaries, and the viruses that are checked and killed are all already It is difficult to detect and kill new viruses. [0003] In the process of researching the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/56G06N5/02
Inventor 周鸿祎董毅周辉
Owner 360 TECH GRP CO LTD