Feature extraction method and device

An extraction method and keyword technology, applied in the computer field, can solve the problems of inability to detect new malware and mutant malware, and achieve the effects of comprehensive detection of malware, improvement of comprehensiveness, and improvement of technical effects

Active Publication Date: 2017-03-15
HANGZHOU NORMAL UNIVERSITY
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The feature extraction method based on program binary text can only detect and kill traditional malware, but cannot detect new malware and mutant malware

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Feature extraction method and device
  • Feature extraction method and device
  • Feature extraction method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The technical solutions of the present invention will be clearly and completely described below in conjunction with the accompanying drawings. Apparently, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0023] In the description of the present invention, it should be noted that the terms "center", "upper", "lower", "left", "right", "vertical", "horizontal", "inner", "outer" etc. The indicated orientation or positional relationship is based on the orientation or positional relationship shown in the drawings, and is only for the convenience of describing the present invention and simplifying the description, rather than indicating or implying that the referred device or element must have a specific orientation, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a feature extraction method and a device, and relates to the technical field of feature extraction. The extraction method comprises the steps of conducting scanning on every source document and preset document in at least one malicious software, obtaining an original key term in every malicious software, and obtaining frequency of occurrence of each initial keyword of each original key term in every malicious software; conducting calculation of a similarity distance between every two key words in the each original key term to obtain a target distance matrix; conducting screening on each original key term according to the similarity distance recorded in the target distance matrix to obtain a target keyword, wherein the similarity distance between every two key words in the target keyword satisfies a preset category value; and finally determining that target key term is feature information of each malicious software. According to the feature extraction method and device, the technological problem in the prior art that when the malicious software is subjected to searching and killing, the searching and killing are usually not comprehensive is solved.

Description

technical field [0001] The technical field of the computer of the present invention particularly relates to a feature extraction method and device. Background technique [0002] With the advent of the Internet era, the penetration rate of smart phones in the world is also increasing. The systems of smart phones mainly include Android and IOS systems. Among them, the Android smart phone operating system has gained huge popularity by virtue of its excellent performance. market share. However, with the development of smart phones, more and more mobile malware has also appeared in the market, endangering the information security of users. Major security laboratories are gradually focusing on mobile phone security protection, but how to effectively detect and kill new malware and variants of malware has always been a difficult problem. [0003] In the prior art, when detecting and killing traditional malicious software, the malware is mainly determined through a feature code ex...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56
CPCG06F21/561G06F21/563
Inventor 孙军梅杨春雷
Owner HANGZHOU NORMAL UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products