Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Global characteristic visulization and local characteristic combined malicious code classification method

A malicious code and local feature technology, applied in the field of malicious code classification, can solve the problems of lack of intermediate layer abstraction, overall texture change, image instability, etc., to achieve a model fault tolerance rate, small texture gray level difference, and improve classification accuracy rate effect

Active Publication Date: 2018-05-22
BEIJING INSTITUTE OF TECHNOLOGYGY +1
View PDF4 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method only uses byte values ​​in the visualization process, resulting in a small amount of generated image information, and is not suitable for the classification of complex malicious sample families
At the same time, directly mapping bytes into grayscale images lacks the abstraction of the intermediate layer, resulting in unstable images and is easily affected by bytes. Even a small number of byte changes can easily cause overall texture changes.
Moreover, this method is not comprehensive in extracting features, and only extracts the global features of the image, ignoring the role of local features
When the malicious code changes greatly (such as modifying the resource section to generate new variants), since the modified part accounts for a large proportion of the overall file, it is easy to cause the overall performance of the samples of the same family to be different and cause classification errors

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Global characteristic visulization and local characteristic combined malicious code classification method
  • Global characteristic visulization and local characteristic combined malicious code classification method
  • Global characteristic visulization and local characteristic combined malicious code classification method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The present invention will be described in detail below with reference to the accompanying drawings and examples.

[0049] The present invention provides a malicious code classification method combining global feature visualization and local features. The basic idea is: divide the malicious code binary file into blocks, calculate three feature values ​​for each block, and fill a corresponding feature value for each block. color channel, thereby visualizing the malicious code binary file into an RGB color image; the three eigenvalues ​​include the eigenvalues ​​that reflect the overall characteristics and internal characteristics of the block; then, extract the global characteristics of the RGB color image, and simultaneously extract the Extract local features in the area; combine the extracted global features and local features to classify malicious code families.

[0050] It can be seen that the present invention realizes the classification of malicious code families b...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a global characteristic visulization and local characteristic combined malicious code classification method. The method comprises the steps of calculating three characteristicvalues for blocking of a malicious code binary file, wherein each characteristic value correspondingly fills one color channel and the malicious code binary file is visualized into an RGB (Red, Greenand Blue) color image; then extracting global characteristics of the RGB color image, and extracting local characteristics from a core region of the malicious code binary file; and performing family classification on malicious codes in combination with the global and local characteristics. With the global characteristic visulization and local characteristic combined malicious code classification method, the amount of information represented by the malicious codes is increased, the image stability and an error-tolerant rate of a classification model are improved, the local characteristics are extracted from the core region of the malicious code binary file to make up for the defect that the grouping capability of the global characteristics is inadequate when a malicious code variant changesgreatly; furthermore, the combination of the global characteristics and the local characteristics has stronger robustness when the changeful malicious code variant is faced, and the classification accuracy of the malicious codes is improved to a great extent.

Description

technical field [0001] The invention relates to the technical field of malicious code classification, in particular to a malicious code classification method combining global feature visualization and local features. Background technique [0002] The widespread use of malicious code automatic generation tools has resulted in a sharp increase in the number of malicious code variants on the Internet, which poses a huge threat to Internet security. At the same time, a large amount of malicious codes also brings a huge challenge to malicious code analysts. Traditional malicious code analysis methods are mostly based on static analysis and dynamic analysis. Static analysis uses disassembly to analyze the relationship between assembly instructions and function calls. This method does not need to execute malicious samples, but it needs to disassemble the samples, and is extremely vulnerable to code obfuscation and packing. Dynamic analysis runs a malicious sample in a virtual env...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56G06K9/46G06K9/62
CPCG06F21/563G06V10/44G06F18/24317
Inventor 薛静锋傅建文王勇单纯梁杰
Owner BEIJING INSTITUTE OF TECHNOLOGYGY
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More