Anti-attack malicious software identification method and system

A malware and identification method technology, applied in the field of anti-attack malware identification methods and systems, can solve problems such as non-normal use, problems, system malicious attacks, etc., and achieve the effect of stable identification performance

Inactive Publication Date: 2013-05-15
CHONGQING UNIV
View PDF2 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Antivirus software usually detects executable code through known patterns, but this approach is problematic
One of the big disadvantages is that before malware can be detected, there must be a sample of this malware
That is to say, traditional malware identification

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-attack malicious software identification method and system
  • Anti-attack malicious software identification method and system
  • Anti-attack malicious software identification method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] In order to make the purpose, technical solution, and advantages of the present invention clearer, the specific implementation examples of a service function authorization method and system involved in the present invention will be further described in detail below with reference to the accompanying drawings.

[0038] refer to figure 1 , the method flowchart of a preferred embodiment of the present invention,

[0039] Step S101, setting recognizer parameters,

[0040] Step S102, converting the software into vectors,

[0041] Step S103, using the identifier to identify the software,

[0042] Step S104, outputting the recognition result.

[0043] The invention converts each binary software program into a vector representation by using N-grams representation, and then carries out intelligent identification. Before it is applied to identify unknown software, the recognizer needs to be trained. The training process is the process of using existing software vector data, i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an anti-attack malicious software identification method and a system and is invented to aim at the defect that a traditional identification system is easily influenced by malicious attack in the prior art. The method includes the steps of setting parameters of an identifying device, converting software into vector quantity, utilizing the identifying device to identify the software, and outputting identification results. The method and the system can achieve intelligent identification for resisting impersonation attack of malicious software, and achieve technical effect of stable identification performance.

Description

technical field [0001] The invention relates to the technical field of computer communication, in particular to an anti-attack malicious software identification method and system. Background technique [0002] Malware is a computer program into which malicious code has been inserted. Computer malware is used to destroy computer systems and destroy important information without the user's knowledge, making the system unusable. It may also be used to collect private information, such as passwords, credit card accounts, etc., and even used to publish pornography and other bad information. With more and more users quickly connecting to the Internet through sophisticated computers, the widespread spread of these malicious software in the future will be very harmful. [0003] There are already many excellent technologies used to detect existing malicious programs, and anti-virus software has been applied quite maturely, such as McAfee, Norton and other anti-virus software have b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/56
Inventor 周喜川吴玉成严超胡盛东
Owner CHONGQING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products