Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and a computing device for identifying malicious file categories

A malicious file and computing device technology, applied in the computer field, can solve the problems of high misjudgment rate, difficult detection of mutation or new malicious files, and reduced detection efficiency, so as to reduce labor costs, improve recognition speed and accuracy, and identify fast effect

Pending Publication Date: 2018-12-28
亚信科技(成都)有限公司
View PDF5 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing schemes are difficult to detect mutations or new types of malicious files (such as deformed viruses, polymorphic viruses, etc., which are widely spread at present), and the false positive rate is high; in addition, with the increase of the signature database, the detection efficiency will also decrease. Greatly reduced

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and a computing device for identifying malicious file categories
  • A method and a computing device for identifying malicious file categories
  • A method and a computing device for identifying malicious file categories

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0027] The method for identifying malicious file types of the present invention is suitable for execution in one or a group of computing devices, that is, the process of identifying malicious files to be identified is completed in one or a group of computing devices. Computing devices can be, for example, servers (such as web servers, application servers, etc.), personal computers such as desktop computers and notebook computers, po...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method of identifying a malicious file class and a computing device for executing the method are disclosed. The method comprises the following steps: preprocessing a malicious file to be identifiedto generate a preprocessing file; at least one feature of that preprocess file being extracted in a predetermined man; processing at least one feature to generate a first number of first feature vectors; and inputting a first number of first feature vectors into a preset classification model to identify categories of malicious files to be identified.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a method and computing equipment for identifying malicious file types. Background technique [0002] Malicious files refer to viruses, worms, and Trojan horse programs that perform malicious tasks on computer systems, as well as advertising programs, spy programs, and backdoor programs that may cause information leakage of computer users. Malicious files are usually spread through the network. With the popularity of the Internet in recent years, malicious files have become more and more flooded, and the number of new malicious files has increased sharply, which seriously endangers network security. Therefore, it becomes more and more important to carry out active defense against malicious files by identifying types of malicious files, and even to kill malicious files. [0003] Most of the existing technical solutions use static feature matching technology to detect and classif...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/56G06N3/08
CPCG06F21/562G06N3/08
Inventor 李晓燕朱斌师政毅
Owner 亚信科技(成都)有限公司