Unlock instant, AI-driven research and patent intelligence for your innovation.

Method, device and equipment for detecting malicious applications and training detection models

A malicious application and detection model technology, applied in computer security devices, instruments, calculations, etc., can solve problems such as manslaughter or omission

Active Publication Date: 2021-06-08
TENCENT TECH (SHENZHEN) CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Aiming at the problem in the related art that malicious application detection is likely to cause manslaughter or missed killing, the present invention provides a method, device, computer-readable storage medium and electronic equipment for detecting malicious applications and training detection models

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and equipment for detecting malicious applications and training detection models
  • Method, device and equipment for detecting malicious applications and training detection models
  • Method, device and equipment for detecting malicious applications and training detection models

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] This section describes example embodiments more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete and fully convey the concept of example embodiments to those skilled in the art.

[0033]Furthermore, the described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided in order to give a thorough understanding of embodiments of the invention. However, those skilled in the art will appreciate that the technical solutions of the present invention may be practiced without one or more of the specific details, or other methods, components, means, steps, etc. may be employed. In other instances, well-known methods, apparatus, implem...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses a method for training a malicious application detection model, comprising: extracting sample features based on application samples with sample labels, where the sample labels are used to mark the security status of the application samples; using the sample labels and the extracted sample features, through training to obtain a first nonlinear relationship model between the sample features and the security state and output a first prediction result; and when it is determined that the first prediction result corresponding to some applications to be detected is wrong, According to the corrected first prediction result and the sample features of the part of the applications to be tested, a second nonlinear relationship model between the sample features and the security state is acquired through training. Based on the solutions of the embodiments of the present invention, the detection model is trained through marked application samples, and the supplementary model is trained in combination with the feedback prediction error samples, so that the coverage and accuracy of malicious application detection can be improved.

Description

technical field [0001] The present invention relates to the technical field of computer applications, in particular to a method, device, computer-readable storage medium and electronic equipment for detecting malicious applications and training detection models. Background technique [0002] In recent years, with the rapid development of the Internet, especially the mobile Internet, more and more service providers choose to provide paid or unpaid services to users through applications (Apps). Correspondingly, the number of Apps installed in user terminals (such as mobile devices or personal computers) is also increasing. While providing great convenience for users, it also leaves room for malicious applications to survive. [0003] Malicious applications usually refer to applications developed by developers by inserting codes that endanger the interests and security of users, causing loss of interests and potential safety hazards to users. Possible harmful behaviors includ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/56
CPCG06F21/563G06F21/566G06F2221/033
Inventor 刘国波
Owner TENCENT TECH (SHENZHEN) CO LTD