Malicious file detection method based on composite feature code
A malicious file and detection method technology, applied in the computer field, can solve the problem of low detection accuracy, achieve great application value, realize false negatives, and increase difficulty
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0029] Embodiments of the present invention provide a method for detecting malicious files based on composite signatures, the method comprising:
[0030] Step 1: Set the main signature set in advance, and set the corresponding non-signature code for each main signature in the main signature set;
[0031] Step 2: Use the main signature set to scan the file to be detected, if and only if the file to be detected can match any one of the main signatures in the main signature set and cannot match any of the main signatures corresponding to the main signature. When a non-signature code is detected, the file to be detected is judged as a malicious file.
[0032] Embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.
[0033] figure 1 It is a flow chart of the first method for detecting malicious files based on composite signatures provided by the embodiment of the present invention. The method includes the following ste...
PUM

Abstract
Description
Claims
Application Information

- Generate Ideas
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com