Unlock instant, AI-driven research and patent intelligence for your innovation.

A malicious code automatic detection platform and method

A malicious code detection and automatic detection technology, applied in the field of information security, can solve the problems that affect the efficiency and accuracy of malicious code detection, affect the performance of malicious code detection models, and the high failure rate of sample feature extraction, so as to enhance detection efficiency and improve detection Ability and effects of generalization, enhanced flexibility and usability

Active Publication Date: 2020-08-04
INST OF SOFTWARE - CHINESE ACAD OF SCI
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Although existing work (such as Shabtai et al [Shabtai A, Moskovitch R, Feher C, et al. Detecting unknown malicious code by applying classification techniques onopcode patterns [J]. Security Informatics, 2012, 1(1): 1.]) Malicious code detection using opcode features can detect malicious code more accurately and effectively, but there are still problems such as high failure rate of sample feature extraction, low extraction efficiency, and low utilization rate of training samples, which affect the efficiency and accuracy of malicious code detection.
[0004] Considering that this kind of malicious code detection based on text classification technology draws on the machine learning text classification technology, and the machine learning algorithm is a data-driven algorithm, there are at least two factors that will affect the performance of the malicious code detection model

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A malicious code automatic detection platform and method
  • A malicious code automatic detection platform and method
  • A malicious code automatic detection platform and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The present invention will be described in detail below in conjunction with the accompanying drawings and embodiments.

[0033] Such as figure 1 As shown in the present invention, a malicious code automatic detection platform and method based on linear scan disassembly and extraction of opcode features adopts a platform based on the Ubuntu 14.10 operating system, automatically collects executable samples, and performs preprocessing such as screening and detection. Disassemble the executable sample, extract its opcode features, vectorize the samples according to the extracted opcode features, and use the vectorized samples to train the malicious code classification and detection model, and then use the trained malicious code to detect The model detects unknown executable samples to determine whether they are malicious codes. The present invention innovatively proposes to use a linear scanning disassembly algorithm to disassemble and extract the operation code features o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a malicious code automated detection platform and method. The method comprises the steps that executable samples are automatically collected, pre-processing procedures of screening, detecting and the like are conducted on the executable samples, disassembly is conducted on the executable samples to extract operating code features of the executable samples, vectoring expression is conducted on the samples according to the extracted operating codes, a malicious code sorting detecting model is trained by using the vectoring samples, and the malicious code detecting modelobtained by training is used for detecting unknown executable samples to judge whether or not the unknown executable samples are malicious codes. According to the platform and method, disassembly operating code feature extraction is conducted on the samples by creatively using a linear scanning disassembly algorithm, detection can be conducted on the samples more rapidly, efficiently and accurately, in addition, automated collecting and preprocessing of the samples can be conducted, data set dividing, sample disassembling and operating code feature extracting can be conducted in an automated manner according to configurations.

Description

technical field [0001] The invention relates to a malicious code automatic detection platform and method, in particular to a malicious code automatic detection platform and method based on linear scan disassembly and extraction of operation code features, belonging to the field of information security technology. Background technique [0002] Malicious code, also known as malicious software, can be defined as a code sequence that threatens the confidentiality, integrity, and availability of a computer system or network system when executed in a certain environment, and has malicious intentions. Malicious codes can be divided into three categories according to their own operation, propagation and attack methods: worms, viruses, and Trojan horses. Although the types of malicious codes are distinguished in the present invention, usually in daily life, people generally refer to all types of malicious codes as viruses. In the present invention, the specific types of malicious co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/56
CPCG06F21/563
Inventor 张东红张震宇
Owner INST OF SOFTWARE - CHINESE ACAD OF SCI