Fuzzy hashing algorithm-based malicious code detection system and method
A malicious code detection and fuzzy hash technology, applied in the field of malicious code detection, can solve problems such as poor detection effect and network bandwidth occupation, and achieve the effect of prolonging transmission time and improving technical effect.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0054] In order to enable those skilled in the art to better understand the technical solutions in the embodiments of the present invention, and to make the above-mentioned purposes, features and advantages of the present invention more obvious and easy to understand, the technical solutions in the present invention will be further detailed below in conjunction with the accompanying drawings illustrate.
[0055] Such as figure 1 As shown, it is a schematic diagram of the malicious code detection system based on the fuzzy hash algorithm of the present invention, including:
[0056] Client 101 and cloud server 102, wherein, client 101 is used for calculating the fuzzy hash value of object to be detected, and transmits to cloud server 102, waits for cloud server 102 to return judgment result, thinks that described object to be detected is malicious code or It is considered that the object to be detected is not malicious code or that the object to be detected needs further judgme...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com