Check patentability & draft patents in minutes with Patsnap Eureka AI!

Malicious program sample classification method and device

A malicious program and classification method technology, applied in computer security devices, instruments, calculations, etc., can solve the problem of low accuracy of clustering methods

Active Publication Date: 2018-10-16
BEIJING QIANXIN TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, scholars at home and abroad have done a lot of research on clustering algorithms for massive samples, but the proposed clustering methods for massive samples are not very accurate.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious program sample classification method and device
  • Malicious program sample classification method and device
  • Malicious program sample classification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention more clear, the embodiments of the present invention will be further described in detail below in conjunction with the accompanying drawings. Here, the exemplary embodiments of the present invention and their descriptions are used to explain the present invention, but not to limit the present invention.

[0050] The inventors found that the existing clustering methods for malicious program samples include dynamic clustering and static clustering. However, no matter whether dynamic clustering or static clustering is performed on malicious program samples, the clustering results obtained are not accurate. For example, some behaviors of samples may not be triggered during dynamic clustering, resulting in incomplete collection of sample behaviors. At this time, the clustering results are not very accurate. If dynamic clustering and static clustering can be combined, t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a rogue program sample classification method and device. The method comprises the following steps: carrying out dynamic clustering on rogue program samples to obtain a dynamic clustering result of the rogue program samples; carrying out static clustering on the rogue program samples to obtain a static clustering result of the rogue program samples; and screening the dynamic clustering result according to the static clustering result, and forming a rogue program sample database based on the screened dynamic clustering result. With the adoption of the rogue program sample classification method and device disclosed by the invention, the accuracy of classifying the rogue program samples can be improved.

Description

technical field [0001] The invention relates to the technical field of computer software, in particular to a method and a device for classifying malicious program samples. Background technique [0002] With the development of information technology, people's work and life are increasingly inseparable from the Internet. While the Internet brings great convenience, there are also many security problems. In recent years, the number of computer malicious programs has developed rapidly, including large-scale outbreaks of malicious programs such as viruses, worms, and Trojan horses, which have caused huge threats and property losses to computer users. Due to the large number of variants of malicious program samples and the great similarity of the source codes of samples produced by the same author, it is very necessary to find the correlation between samples and conduct homology analysis on a large number of samples. This involves the clustering of massive samples. Security ven...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/56
CPCG06F21/563
Inventor 计东韩鹏
Owner BEIJING QIANXIN TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More