Supercharge Your Innovation With Domain-Expert AI Agents!

A method, device and storage medium for detecting malicious programs

A malicious program and detection model technology, applied in the field of database processing, can solve problems such as insufficient guarantee of operating environment security, and achieve the effects of improving user experience, improving detection rate, and improving detection speed.

Active Publication Date: 2021-01-12
XIAMEN ANSCEN NETWORK TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

With the exponential growth of malicious programs, traditional detection methods are no longer sufficient to ensure the security of the operating environment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method, device and storage medium for detecting malicious programs
  • A method, device and storage medium for detecting malicious programs

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031]The application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain related inventions, rather than to limit the invention. It should also be noted that, for the convenience of description, only the parts related to the related invention are shown in the drawings.

[0032] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present application will be described in detail below with reference to the accompanying drawings and embodiments.

[0033] figure 1 A method for detecting malicious programs of the present invention is shown, the method includes:

[0034] Static analysis step S101, performing static analysis on the sample file to be detected, if the static analysis result is that the sample file contains ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a method, device and storage medium for detecting malicious programs. In the method, a sample file to be detected is statically analyzed, and if it cannot be determined whether the sample file is malicious, dynamic analysis and identification is performed on the sample file. Determine whether the sample file is malicious, then use the deep learning detection model to detect, and use the behavior of dynamic analysis and the static information of static analysis to convert the image suitable for deep learning model recognition into classification when the deep learning model is detected. Three-level detection improves the detection rate of malicious programs, greatly improves the recognition rate of widely spread deformed malicious programs and polymorphic malicious programs, and reduces the false positive rate, and also improves the detection speed and improves user experience. .

Description

technical field [0001] The invention relates to the technical field of database processing, in particular to a method, device and storage medium for detecting malicious programs. Background technique [0002] Traditional malicious program detection technologies include signature detection, behavior detection, heuristic scanning, and machine learning. The principles of these detections are different, the overhead required for implementation and the scope of detection are different, and they all have some limitations, which cannot deal with malicious programs under new technologies. It is commonly used to detect malicious programs based on statistical and feature rule analysis and using virtual technology. However, compared with the development speed and trend of malicious programs, as well as the number of malicious programs, traditional malicious program detection technology has entered a technical bottleneck and cannot meet the detection requirements of malicious programs....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/56
CPCG06F21/562G06F21/566
Inventor 林思明陈腾跃王锦江吴陈炜梁煜麓杨心恩罗佳
Owner XIAMEN ANSCEN NETWORK TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More