Systems and methods for creating customized confidence bands for use in malware detection

A malicious software and confidence band technology, applied in transmission systems, electrical components, computer security devices, etc., can solve problems such as misjudgments and missed judgments, reduce misjudgments and/or missed judgments, and improve malware detection technology Effect

Active Publication Date: 2013-05-15
CA TECH INC
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Unfortunately, heuristic-based classification methods can lead to an unacceptable number of false positives and / or missed positives

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Systems and methods for creating customized confidence bands for use in malware detection
  • Systems and methods for creating customized confidence bands for use in malware detection
  • Systems and methods for creating customized confidence bands for use in malware detection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] See below figure 1 , 2 and 5 detail an exemplary system for creating customized confidence bands for use in malware detection. will also combine image 3 , 4 and 6 provide a detailed description of the corresponding computer-implemented method. Additionally, will combine Figure 7 and 8 Detailed descriptions are respectively provided of an exemplary computing system and network architecture capable of implementing one or more of the embodiments described herein.

[0021] figure 1 is a block diagram of an exemplary system 100 for creating customized confidence bands for use in malware detection. As shown in this figure, exemplary system 100 may include one or more modules 102 for performing one or more tasks. For example, as will be explained in more detail below, exemplary system 100 may include an identification module 104 programmed to 1) identify a portal that receives executable content, and 2) identify metadata associated with that portal. Exemplary system...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A computer-implemented method for creating customized confidence bands for use in malware detection may include 1) identifying a portal for receiving executable content, 2) identifying metadata relating to the portal, 3) analyzing the metadata to determine what risk executable content received via the portal poses, and then 4) creating, based on the analysis, a confidence band to apply during at least one disposition of executable content received via the portal. Various other methods, systems, and computer-readable media are also disclosed.

Description

Background technique [0001] Consumers and businesses face a growing trend of malware that threatens the stability and performance of their computers and the security of their data. Computer programmers with malicious motives have created and continue to create viruses, Trojan horses, worms, and other programs (collectively "malware") in an attempt to harm computer systems. To evade detection, malicious programmers can inject malware into or between legitimate programs. [0002] Many security software companies try to combat malware by routinely creating and configuring malware signatures (eg, hash functions that uniquely identify malware) for their customers. However, a large amount of malware remains unidentified and therefore undetectable using traditional signature-based malware detection mechanisms, especially since malware authors regularly modify their malware in an attempt to bypass commonly used signature-based malware detection mechanisms. malware detection mechanis...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/51G06F21/56H04L29/06
CPCG06F21/51H04L29/06877G06F21/56H04L63/145H04L63/1416G06F21/577
Inventor J·陈J·J·朴
Owner CA TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products