Malicious file identification method, device and storage medium

A malicious file and identification method technology, applied in the Internet field, can solve problems such as low efficiency, virus harm, and time-consuming extraction of virus features, and achieve the effect of improving detection efficiency, accurate and effective extraction

Active Publication Date: 2012-10-17
TENCENT TECH (SHENZHEN) CO LTD
View PDF4 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 1. The professional skills of analysts are highly required, and the quality of virus feature extraction determines the false alarm rate and report rate;
[0006] 2. It is time-consuming to analyze virus files and extract virus characteristics;
[0007] 3. Low efficiency. With the increase of virus database records, the time required to collide wi

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious file identification method, device and storage medium
  • Malicious file identification method, device and storage medium
  • Malicious file identification method, device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0031] The solution of the embodiment of the present invention is mainly: use a learning set composed of a predetermined malicious file and a normal file to generate a machine learning model; read files to be detected outside the learning set, and convert the files to be detected into vectors, through machine learning The model performs malicious file identification on the files to be detected that are converted into vectors, and uses the characteristics of timely response and fast processing speed of machine learning to improve the detection efficiency of malicious files.

[0032] The malicious file in the present invention may be a virus file or other malicious files. The following embodiment uses malicious files as examples. Among them, the technical terms involved include:

[0033] Black file: virus file

[0034] Black vector: the vector transformed into the virus file

[0035] White file: normal non-virus file

[0036] White vector: the vector converted from normal non-virus file...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a malicious file identification method, a device and a storage medium. The method comprises the steps of adopting a preset learning set consisting of a malicious file and a normal file to generate a machine learning model; reading a file to be detected other than the learning set; converting the file to be detected to a vector; and performing the malicious file identification on the file to be detected which is converted to the vector through the machine learning model. The machine learning model is generated by the preset learning set consisting of the malicious file and the normal file, and the generated machine learning model is used for performing the malicious file identification on the file to be detected except the learning set, so that the virus characteristics can be timely, accurately and efficiently extracted, any discovered malicious file can be immediately processed, and the detection efficiency of the malicious file can be greatly improved.

Description

technical field [0001] The present invention relates to the field of Internet technology, in particular to the field of security, in particular to a malicious file identification method, device and storage medium. Background technique [0002] With the development of Internet technology, the spread of viruses is also increasing. Viruses have caused great harm to the security of user information and user property. Therefore, the development of an antivirus engine that responds quickly, efficiently, and has a high rate of virus detection and accuracy has become the focus of today's Internet information security circles. [0003] The virus identification technology usually adopted by traditional antivirus engines is as follows: analysts analyze virus files, extract virus signatures, store virus signatures into the database, antivirus engines scan existing files according to the virus database, and report viruses if they encounter matching signatures. [0004] Traditional virus...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/00
Inventor 崔精兵杨宜于涛白子潘吴家旭
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products