Method and apparatus for detecting abnormal data

An abnormal data detection and data technology, which is applied in the field of data processing, can solve the problems of many hidden dangers in network security and the inability of detection methods to detect network attacks well, and achieve the effect of improving accuracy

Active Publication Date: 2018-11-13
TENCENT TECH (SHENZHEN) CO LTD
View PDF3 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, there are more and more attack methods that use normal programs to do evil. The detection methods for malicious progra

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for detecting abnormal data
  • Method and apparatus for detecting abnormal data
  • Method and apparatus for detecting abnormal data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] Embodiments of the present application are described below in conjunction with the accompanying drawings. Apparently, the described embodiments are only part of the embodiments of the present application, not all of the embodiments. Those of ordinary skill in the art know that, with the development of technology, the technical solutions provided in the embodiments of the present application are also applicable to similar technical problems.

[0023] The embodiment of the present application provides a method for detecting abnormal data, which can detect abnormal programs in programs, thereby improving the accuracy of abnormal detection. The embodiment of the present application also provides a corresponding device. Each will be described in detail below.

[0024] figure 1 It is a schematic diagram of an embodiment of the abnormal data detection system in the embodiment of the present application.

[0025] Such as figure 1 As shown, an embodiment of the abnormal data...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for detecting abnormal data. The method comprises the steps of obtaining behavior data of each dimension in a plurality of dimensions of a to-be-detected file; determining portrait data of each dimension according to the behavior data of each dimension, wherein the portrait data of each dimension comprises program information of the to-be-detected file in the dimension; comparing the program information of each dimension in the to-be-detected file with established standard program detection information, thereby determining an offset of the program information of each dimension; and determining whether an abnormal program exists in the to-be-detected file or not according to the offset of the program information of each dimension. An embodiment of the invention further provides a corresponding apparatus. According to the technical scheme, whether the abnormal program exists in the file or not can be detected through the offset, so that the accuracy of anomaly detection is improved.

Description

technical field [0001] The present application relates to the technical field of data processing, and in particular to a method and device for abnormal data detection. Background technique [0002] With the rapid development of the Internet, there are more and more network attacks. In network attacks, hackers usually spread malicious programs written with attack intentions to the network, for example: embedded in some videos or files, once the user clicks Corresponding to the video or file implanted with a malicious program, the user's terminal will be implanted with the malicious program, thereby causing the user's terminal to be poisoned or information stolen. [0003] In the prior art, there are also some detection technologies for malicious programs to prevent these malicious programs, for example, the detection of malicious programs is realized by detecting program signatures and the like. [0004] However, there are more and more attack methods using normal programs t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/56
CPCG06F21/562
Inventor 马立伟蔡晨王森王月强李志豪
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products