Unlock instant, AI-driven research and patent intelligence for your innovation.

A Malicious Code Classification Method Based on Image Texture Fingerprinting

一种恶意代码、图像纹理的技术,应用在恶意代码分类领域,能够解决速度慢、特征数据量大、恶意代码分类精度低等问题,达到提高分类速度、提高精度、减少特征数量的效果

Active Publication Date: 2021-06-22
CHINESE PEOPLES LIBERATION ARMY ARMY ARTILLERY & AIR DEFENSE ACAD ZHENGZHOU CAMPUS
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The present invention provides a malicious code classification method based on image texture fingerprints, which solves the problem that the malicious code classification technology in the prior art cannot effectively identify confusing malicious codes, and the amount of extracted feature data is large, which in turn leads to low accuracy of malicious code classification, slow speed problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Malicious Code Classification Method Based on Image Texture Fingerprinting
  • A Malicious Code Classification Method Based on Image Texture Fingerprinting
  • A Malicious Code Classification Method Based on Image Texture Fingerprinting

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] In order to facilitate the understanding of the present invention, the present invention will be described in more detail below in conjunction with the accompanying drawings and specific embodiments. Preferred embodiments of the invention are shown in the accompanying drawings. However, the present invention can be implemented in many different forms and is not limited to the embodiments described in this specification. Rather, these embodiments are provided for the purpose of making the disclosure of the present invention more thorough and comprehensive.

[0023] It should be noted that, unless otherwise defined, all technical and scientific terms used in this specification have the same meaning as commonly understood by those skilled in the technical field of the present invention. Terms used in the description of the present invention are only for the purpose of describing specific embodiments, and are not used to limit the present invention. The term "and / or" used...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a malicious code classification method based on image texture fingerprints. By combining image analysis technology and malicious code classification technology, the operation code is digitized and mapped to a two-channel uncompressed grayscale image, and then according to the grayscale transformation method The dual-channel image is converted into a single-channel grayscale image, the texture features of the image are extracted using the gray level co-occurrence matrix, and these features are used as the essential features of the malicious code. Finally, the random forest algorithm is used to classify the malicious code. The malicious code classification method based on image texture fingerprints of the present invention reduces the number of features used to express malicious codes on the one hand and improves the classification speed of malicious codes; on the other hand, it effectively overcomes malicious codes such as rearrangement of operation codes and code transformation The problem of code obfuscation improves the accuracy of malicious code classification.

Description

technical field [0001] The invention relates to the field of malicious code classification, in particular to a malicious code classification method based on image analysis. Background technique [0002] With the vigorous development of the Internet, malicious code has become one of the main factors threatening Internet security, and it shows a trend of rapid growth. In the prior art, methods for analyzing and identifying malicious code usually include static analysis methods and dynamic analysis methods. The dynamic analysis method is to analyze the code during the running process, and the analyzed code is the code actually executed. However, many malicious codes have multiple execution paths, so the dynamic analysis method itself has certain limitations; the static analysis method first disassembles the executable program, and extracts the code on this basis. Classify the characteristic information, in the prior art, many researchers have converted the malicious code into ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/56G06K9/62
CPCG06F21/563G06F18/241
Inventor 钱叶魁卢喜东杜江黄浩杨瑞朋雒朝峰李宇翀
Owner CHINESE PEOPLES LIBERATION ARMY ARMY ARTILLERY & AIR DEFENSE ACAD ZHENGZHOU CAMPUS