Judgment model for detecting malicious program and detection method of malicious program
A malicious program and judgment model technology, applied in the direction of instrumentation, electrical digital data processing, platform integrity maintenance, etc., can solve problems such as high false detection rate, too simple 7 program features, and insufficient generalization detection ability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0105] In this embodiment, 14863 malicious program samples collected from the VX-Heaven public malicious program database and 2623 non-malicious program samples collected from the original Windows XP system are used as training data. In addition, 1100 malicious programs and 1100 non-malicious programs collected from security forums on the Internet are used as test data.
[0106] In this example:
[0107] r 1 、r 2 、r 3 、r 4 、r 5 、r 6 、r 7 、r 8 、r 9 are equal to 0.005,
[0108] d 1 、d 4 、d 7 are equal to 0.4,
[0109] d 2 、d 5 、d 8 are equal to 0.35,
[0110] d 3 、d 6 、d 9 are equal to 0.3,
[0111] In the OCSVM algorithm, the kernel bandwidth of the RBF kernel function is 0.01.
[0112] The relevant parameters (ω and ρ) of the OCSVM algorithm model are the results of algorithm optimization. Due to the inherent randomness of the optimization algorithm, the performance of the algorithm model can be guaranteed by the parameter selection process, so ensuring t...
Embodiment 2
[0120] The difference between this embodiment and Embodiment 1 is that in the detection process, if the data, comparison algorithm and experimental process consistent with Embodiment 1 are used only when the rules and machine learning algorithms are judged as malicious programs, then the simulation experiment The results are shown in Table 2:
[0121] Table 2 Simulation experiment results
[0122]
[0123] As can be seen from the simulation experiment results in Table 2, the present invention, which adopts a more stringent control of the false detection rate detection process, has achieved a false detection rate significantly lower than that of all the comparison group algorithms, while the detection rate is at the middle level of the comparison group algorithms. Therefore, it can be further illustrated that the present invention is effective in controlling the false detection rate and ensuring the balance of the detection rate.
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com