Supercharge Your Innovation With Domain-Expert AI Agents!

Malicious code detection method and system based on information gain

A malicious code detection and information gain technology, applied in the malicious code detection method and system field based on information gain, can solve the problems of slowing down the normal operation of the system, high computer overhead, malicious code damage, etc., to reduce overfitting problems, Improve the detection rate and accuracy, the effect of improving the detection rate

Inactive Publication Date: 2016-04-13
HARBIN ANTIY TECH
View PDF2 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantage of this technology is that it is necessary to manually find and obtain malicious code samples and extract signatures to add to the malicious code signature database; while the detection technology based on malicious code behavior rules is to detect malicious codes based on the common behavior rules of malicious codes predefined by experts.
There is a lag in this method, especially as the operating speed of the computer is greatly improved, by the time malicious code behavior is detected, it has often brought irreparable losses to the system
The above two detection technologies are post-mortem detection technologies that can only detect known malicious code, or can only be detected after the malicious code is executed, but during this period the malicious code has already caused damage
There are also some malicious code detection methods that have high computer overhead and often slow down the normal operation of the system.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious code detection method and system based on information gain
  • Malicious code detection method and system based on information gain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The present invention provides a malicious code detection method and system embodiments based on information gain, in order to enable those skilled in the art to better understand the technical solutions in the embodiments of the present invention, and to make the above-mentioned purposes, features and The advantages can be more obvious and easy to understand, and the technical solution in the present invention will be further described in detail below in conjunction with the accompanying drawings:

[0040] The present invention firstly provides an embodiment of a malicious code detection method based on information gain, such as figure 1 shown, including:

[0041] S101. Collect malicious samples and non-malicious samples to form a training sample set; wherein, mark whether each sample is malicious, which can be N or Y, N represents a non-malicious sample, and Y represents a malicious sample;

[0042] S102. Selecting various splitting criteria to form an attribute set;...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a malicious code detection method based on information gain. The method comprises the following steps of collecting samples to form a training sample set; selecting splitting criteria to form an attribute set; intensively extracting samples from the training sample set in a returning random extraction form to form a test sample set; randomly extracting features by aiming at the test sample set to form a feature sample set; selecting the splitting criterion of each splitting node from the attribute set based on the information gain maximization criterion; performing layer-by-layer splitting on the feature sample set until the splitting cannot continue; finally combining the splitting criteria of all of the splitting nodes to form a decision-making tree; repeating the processes to obtain the required quantity of decision-making trees; giving judging results for data to be detected by each decision-making tree; and giving the final detection result by integrating all judging results. The invention also discloses a malicious code detection method based on information gain. By using the technical scheme, unknown malicious code can be effectively recognized; and the detection efficiency can be improved.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a malicious code detection method and system based on information gain. Background technique [0002] At present, although the detection technology of malicious code is constantly developing, the detection technology and ability of malicious code still lag behind the development of malicious code, especially the ability to detect unknown malicious code poses a huge challenge to malicious code detection technology. Currently commonly used detection technologies include: signature-based pattern matching technology and detection technology based on malicious code behavior rules, wherein the signature-based pattern matching technology is to combine the signature code of the detected file with the malicious code signature string in the signature database Matching is performed. When the match is successful, it means that the detected file contains malicious code, otherwise...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/56
CPCG06F21/563G06F2221/033
Inventor 常安琪李柏松
Owner HARBIN ANTIY TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More