Method, device and apparatus for detecting malicious application and training detection model

A malicious application and detection model technology, applied in computer security devices, instruments, electrical digital data processing, etc., can solve problems such as manslaughter or omission, and achieve the effect of improving coverage and accuracy

Active Publication Date: 2019-03-29
TENCENT TECH (SHENZHEN) CO LTD
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Aiming at the problem in the related art that malicious application detection is likely to cause manslaughter or missed killing, the present invent

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and apparatus for detecting malicious application and training detection model
  • Method, device and apparatus for detecting malicious application and training detection model
  • Method, device and apparatus for detecting malicious application and training detection model

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] This section will more fully describe example embodiments with reference to the accompanying drawings. However, the example embodiments can be implemented in various forms, and should not be construed as being limited to the examples set forth herein; on the contrary, the provision of these embodiments makes the present invention more comprehensive and complete, and fully conveys the concept of the example embodiments To those skilled in the art.

[0033] Furthermore, the described features, structures or characteristics may be combined in one or more embodiments in any suitable manner. In the following description, many specific details are provided to give a sufficient understanding of the embodiments of the present invention. However, those skilled in the art will realize that the technical solutions of the present invention can be practiced without one or more of the specific details, or other methods, components, devices, steps, etc. can be used. In other cases, wel...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method for training a malicious application detection model includes extracting sample features based on an application sample with a sample tag for marking a security state of the application sample, Using the sample tag and the extracted sample features to obtain a first non-linear relationship model between the sample features and a security state by training and output a first prediction result; And obtaining a second non-linear relationship model between the sample characteristics and the safety state by training according to the corrected first prediction result and the sample characteristics of the partial application to be detected when the first prediction result corresponding to the partial application to be detected is determined to be wrong. The scheme based on the embodimentof the invention can improve the coverage rate and the accuracy rate of malicious application detection by training the detection model with the labeled application sample and training the supplementary model with the predictive error sample combined with feedback.

Description

Technical field [0001] The present invention relates to the technical field of computer applications, in particular to a method, a device, a computer-readable storage medium and an electronic device for detecting malicious applications and training detection models. Background technique [0002] In recent years, with the rapid development of the Internet, especially the mobile Internet, more and more service providers choose to provide paid or free services to users through applications (App). Correspondingly, the number of apps installed in user terminals (such as mobile devices or personal computers) is increasing. While this provides great convenience to users, it also leaves room for malicious applications to survive. [0003] A malicious application usually refers to an application that is developed by a developer by inserting code that endangers the safety of the user's interests in the application, which causes loss of profit and security risks to the user. Possible harmfu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/56
CPCG06F21/563G06F21/566G06F2221/033
Inventor 刘国波
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products