System and method for detecting unknown malware

A malicious software and malicious technology, applied in the field of systems and computer program products for detecting unknown malicious software, and can solve problems such as long operation time

Inactive Publication Date: 2012-07-18
AO KASPERSKY LAB
View PDF6 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The protection's heuristic analysis method also has shortcomings in detecting unknown malware: firstly, the longer operation time compared to the signature method; and secondly, it provides a detection rate of 60-70%, which is already close to the limit of its capabilities

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for detecting unknown malware
  • System and method for detecting unknown malware
  • System and method for detecting unknown malware

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] Exemplary embodiments of the present invention are described herein in terms of systems, methods, and computer program products for detecting unknown malicious objects. Those of ordinary skill in the art should understand that the following description is only exemplary and not intended to be limiting in any way. Other embodiments will readily occur to those skilled in the art having the benefit of this disclosure. Reference will now be made in detail to implementations of exemplary embodiments of the invention which are illustrated in the accompanying drawings. Wherever possible, the same reference numbers will be used throughout the drawings and the following description to refer to the same or like items.

[0028] In an exemplary embodiment, the concept of an "object genome" is used to describe software objects, adapt methods for analyzing software objects, and detect malicious objects. A software object, as used herein, includes files in different formats, such as...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Disclosed are systems, methods and computer program products for detecting unknown malware. A method comprises generating genes for known malicious and clean objects; analyzing object genes using different malware analysis methods; computing a level of successful detection of malicious objects by one or a combination of malware analysis methods based on analysis of genes of the known malicious objects; computing a level of false positive detections of malicious objects by one or a combination of malware analysis methods based on analysis of genes of known clean objects; measuring effectiveness of each one or the combination of malware analysis methods as a function of the level of successful detections and the level of false positive detections; and selecting one or a combination of the most effective malware analysis methods for analyzing unknown object for malware.

Description

technical field [0001] The present invention relates generally to the field of computer security, and in particular, to systems, methods and computer program products for detecting unknown malware. Background technique [0002] Over the past decade, the significant growth in the number of Internet users driven by the development of Internet services such as gaming, news, entertainment, shopping, banking, social networking, etc. has led to a significant increase in the emergence of new types of malware. In the past three years alone, the number of new malicious program detections has increased more than tenfold. And that growth rate continues to increase. As such, antivirus software developers have struggled to keep pace with the proliferation of new classes of malware by developing new systems and methods for detecting malware. [0003] As a result of this development, signature matching and heuristic analysis techniques for malware have become widely popular and are extre...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00G06F21/56
CPCG06F21/562G06F21/561H04L63/145
Inventor 尤里·V·马舍夫斯基罗曼·瓦西连科
Owner AO KASPERSKY LAB
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products