Deep learning-based malicious code sample classification method and system

A malicious code and deep learning technology, applied in the field of information security, can solve the problems of low efficiency and low accuracy, and achieve the effect of overcoming low efficiency, improving accuracy, and improving computing efficiency

Active Publication Date: 2016-10-05
WUHAN ANTIY MOBILE SECURITY
View PDF3 Cites 42 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The technical scheme described in the present invention can overcome the prob

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Deep learning-based malicious code sample classification method and system
  • Deep learning-based malicious code sample classification method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The present invention provides a malicious code sample classification method and system embodiments based on deep learning, in order to enable those skilled in the art to better understand the technical solutions in the embodiments of the present invention, and to make the above-mentioned purpose and features of the present invention And advantage can be more obvious and easy to understand, below in conjunction with accompanying drawing technical scheme in the present invention is described in further detail:

[0045] The present invention firstly provides an embodiment of a method for classifying malicious code samples based on deep learning, such as figure 1 shown, including:

[0046] S101 disassembles the malicious code sample to obtain assembly code; wherein, the malicious code sample includes but not limited to: apk file or dex file;

[0047]S102 converts the assembly code into image sample data based on the corresponding relationship between the hexadecimal code ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a deep learning-based malicious code sample classification method. The method comprises the following steps: disassembling malicious code samples to obtain assembly codes; converting the assembly codes into image sample data on the basis of a corresponding relationship between a hexadecimal code and an image gray value; and inputting the image sample data into a pre-trained convolutional neural network so as to a malicious code sample classification result. The invention furthermore discloses a deep learning-based malicious code sample classification system. According to the deep learning-based malicious code sample classification method and system, classes of the malicious code samples can be correctly recognized, and the correctness of the malicious code sample classification is improved.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to a method and system for classifying malicious code samples based on deep learning. Background technique [0002] Malicious code (Unwanted Code) refers to code that has no effect but brings danger, also known as malware. Ed Skoudis defines malware as a set of instructions that run on a computer to make the system perform tasks according to the attacker's wishes; Microsoft uses malware to refer to worms, viruses, and Trojan horses that deliberately perform malicious tasks in a computer system. Malicious code classification is an important content in the field of malicious code research. Scholars at home and abroad have conducted in-depth research on this. Existing automatic malicious code analysis technologies mainly include static analysis and dynamic analysis: (1) Static analysis technology is based on File structure analysis, disassembly, decompilation and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/56G06K9/62G06N3/02
CPCG06F21/563G06N3/02G06F2221/034G06F18/2411
Inventor 何源浩孙岩马志远
Owner WUHAN ANTIY MOBILE SECURITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products