File security identification method and device

An identification method and security technology, applied in the computer and security fields, can solve the problems of missing virus file detection, inability to identify virus files, and difficulty in comprehensively covering attack types, and achieve the effect of comprehensive identification and improved applicability

Inactive Publication Date: 2017-11-03
BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
View PDF6 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, when using the above method to check whether the installation package file is safe, on the one hand, due to the limitation of the number of virus samples, it is difficult to fully cover all attack types, resulting in missed detection of virus files

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File security identification method and device
  • File security identification method and device
  • File security identification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] The application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain related inventions, rather than to limit the invention. It should also be noted that, for the convenience of description, only the parts related to the related invention are shown in the drawings.

[0017] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present application will be described in detail below with reference to the accompanying drawings and embodiments.

[0018] figure 1 An exemplary system architecture 100 to which embodiments of the file security identification method or apparatus of the present application can be applied is shown.

[0019] Such as figure 1 As shown, the system architecture 100 may include terminal device...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a file security identification method and device. One embodiment of the invention comprises the steps that feature information of a to-be-identified file is acquired; each type of feature information among the feature information is converted into input vectors of a preset machine learning model corresponding to the feature information; and whether the to-be-identified file is a virus file is determined based on output vectors of the preset machine learning model. Through the file security identification method and device, the feature information is acquired according to each type of features of the to-be-identified file, and machine learning models are created respectively according to characteristics of the feature information for training and identification. On the one hand, the features of a virus file are covered comprehensively, and therefore the virus file is identified comprehensively. On the other hand, through training on the machine learning models, the mode of the virus file is determined through the machine learning models, therefore, the virus file can still be identified according to the mode of the virus file when the features of the virus file change, and the applicability of file security identification is further improved.

Description

technical field [0001] The present application relates to the field of computers, in particular to the field of security technology, and in particular to a method and device for document security identification. Background technique [0002] With the rapid development of the Internet, the network resources that users can download are becoming more and more abundant. When a user needs to install an application, he only needs to download the installation package file of the application, and then install the application. In this process, ensuring the safety of the installation package files downloaded by users is the top priority. At present, the usual way to check whether the installation package file is safe is to extract some features in the virus sample in advance, and then extract the features of the same type as the features in the file to be identified. When the feature in the file to be identified is extracted When it matches the characteristics of the pre-acquired vi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/56G06F15/18
Inventor 陈治宇周吉文郭疆徐超
Owner BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products