Spyware self-adaptation induction and detection method based on artificial immunity
A detection method and computer technology, applied in the field of information security, can solve problems such as false positives
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0065] The technical method of the present invention will be described in detail below in conjunction with the accompanying drawings. The implementation process of the computer immune-based spyware adaptive induction and detection method and system is mainly divided into 5 steps, and the specific implementation plan of each step is as follows:
[0066] 1. System behavior perception
[0067] Although spyware acts relatively low-key, it will inevitably implement certain behaviors in order to achieve profitability. The perception of these behaviors is the starting point for the computer immune system to discover hidden spyware. The inherent behavior of spyware is mainly divided into the following three categories:
[0068] 1) Hide appearance behavior
[0069] Spyware usually hides its existence, which is mainly achieved by hiding its own files, processes and related registry entries (used for spyware's self-starting). Since normal applications rarely have such behaviors, when this beh...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com