Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Malicious file identification method, device and storage medium

A malicious file and identification method technology, applied in the Internet field, can solve problems such as low efficiency, virus harm, and time-consuming extraction of virus features, and achieve the effect of improving detection efficiency, accurate and effective extraction

Active Publication Date: 2012-10-17
TENCENT TECH (SHENZHEN) CO LTD
View PDF4 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 1. The professional skills of analysts are highly required, and the quality of virus feature extraction determines the false alarm rate and report rate;
[0006] 2. It is time-consuming to analyze virus files and extract virus characteristics;
[0007] 3. Low efficiency. With the increase of virus database records, the time required to collide with each record will increase geometrically;
[0008] 4. The discovery of viruses is not timely. Compared with the massive new virus types, due to the limited processing ability of analysts, the processing of some viruses will only be discovered or taken seriously when the virus breaks out, and then processed. The virus has caused considerable damage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious file identification method, device and storage medium
  • Malicious file identification method, device and storage medium
  • Malicious file identification method, device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The solution of the embodiment of the present invention is mainly: using a learning set composed of predetermined malicious files and normal files to generate a machine learning model; reading the files to be detected other than the learning set, and converting the files to be detected into vectors, and using The model identifies malicious files on the files to be detected that are converted into vectors, and uses machine learning to respond in a timely manner and process quickly to improve the detection efficiency of malicious files.

[0032] Malicious files in the present invention may be virus files or other malicious files, and the following embodiments use malicious files as examples for illustration. Among them, the technical terms involved include:

[0033] Black Files: Virus Files

[0034] Black vectors: vectors converted from virus files

[0035] White files: normal non-virus files

[0036] White vector: the vector converted from a normal non-virus file

[...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a malicious file identification method, a device and a storage medium. The method comprises the steps of adopting a preset learning set consisting of a malicious file and a normal file to generate a machine learning model; reading a file to be detected other than the learning set; converting the file to be detected to a vector; and performing the malicious file identification on the file to be detected which is converted to the vector through the machine learning model. The machine learning model is generated by the preset learning set consisting of the malicious file and the normal file, and the generated machine learning model is used for performing the malicious file identification on the file to be detected except the learning set, so that the virus characteristics can be timely, accurately and efficiently extracted, any discovered malicious file can be immediately processed, and the detection efficiency of the malicious file can be greatly improved.

Description

technical field [0001] The present invention relates to the field of Internet technology, in particular to the field of security, in particular to a malicious file identification method, device and storage medium. Background technique [0002] With the development of Internet technology, the spread of viruses is also increasing. Viruses have caused great harm to the security of user information and user property. Therefore, the development of an antivirus engine that responds quickly, efficiently, and has a high rate of virus detection and accuracy has become the focus of today's Internet information security circles. [0003] The virus identification technology usually adopted by traditional antivirus engines is as follows: analysts analyze virus files, extract virus signatures, store virus signatures into the database, antivirus engines scan existing files according to the virus database, and report viruses if they encounter matching signatures. [0004] Traditional virus...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/00
Inventor 崔精兵杨宜于涛白子潘吴家旭
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products