Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Method and device for recognizing rogue programs

A malicious program and identification method technology, applied in neural learning methods, computer security devices, biological neural network models, etc., can solve the problems of low accuracy, high implementation and maintenance costs, and achieve improved accuracy, convenient environment setup, Simple deployment and installation

Inactive Publication Date: 2017-11-24
MICRO DREAM TECHTRONIC NETWORK TECH CHINACO
View PDF4 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Embodiments of the present invention provide a malicious program identification method and device to overcome the problems of high technical implementation and maintenance costs and low accuracy of existing identification methods

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for recognizing rogue programs
  • Method and device for recognizing rogue programs
  • Method and device for recognizing rogue programs

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0025] Those skilled in the art know that the embodiments of the present invention can be implemented as a system, device, device, method or computer program product. Therefore, the present disclosure may be embodied in the form of complete hardware, complete software (including firmware, resident software, microcode, etc.), or a combination of hardware and software.

[0026] The principle and spirit of the present invention will be explained in detail below w...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and device for recognizing rogue programs. The method comprises the following steps: acquiring an installation package file of a detected application, and running the installation package file in a simulator through a Hook mode; triggering behaviors of the detected application, and acquiring detected behavior log from the simulator through a Hook mode; carrying out vectorization treatment on the acquired detected behavior log; and transmitting the detected behavior log subjected to vectorization treatment into a neural network constructed on the basis of a behavior log sample and recognizing the detected behavior log to obtain the type of the detected application, wherein the behavior log sample is a behavior log of the application with the known type, and the type of the application comprises rogue programs or non-rogue programs. A log analyzing mode of the neural network is adopted, and accuracy on judgment of rogue applications is improved; and moreover, a system source code does not need to be corrected, and high time cost, development cost and maintenance cost do not need to be consumed; and the coupling of a frame is low, and extension is facilitated.

Description

technical field [0001] The invention relates to the field of Internet data processing, in particular to a malicious program identification method and device. Background technique [0002] This section is intended to provide a background or context for implementations of the invention that are recited in the claims. The descriptions herein are not admitted to be prior art by inclusion in this section. [0003] An existing malicious program identification method is a method based on feature code identification, which is mainly by obtaining the characteristics of the current detection sample (malicious Android application program), wherein the characteristics include network access, file reading, private data access, etc. Multi-dimensional information, and then generate a signature matching the current sample, and compare the generated signature with the signature in the existing signature database, so as to determine the maliciousness of the current detection sample. But thi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56G06F11/34G06N3/04G06N3/08
CPCG06F11/3476G06F21/566G06N3/04G06N3/08
Inventor 夏宇天
Owner MICRO DREAM TECHTRONIC NETWORK TECH CHINACO
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products