Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Malicious code query method and system

A malicious code and query method technology, applied in special data processing applications, instruments, electrical digital data processing, etc., can solve the problems of inappropriate large-scale calculation and comparison, limited improvement space for fuzzy hash algorithm, long time consumption, etc. Query time, improve efficiency and applicability, simplify calculation effect

Active Publication Date: 2019-07-05
HARBIN ANTIY TECH
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, once the amount of data is too large, the fuzzy hash value algorithm of the related technology will have the problems of long time consumption and cumbersome calculation, resulting in low detection efficiency, which is not suitable for large-scale calculation comparison. In the current era, the fuzzy hash algorithm of related technologies has limited improvement space and poor applicability

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious code query method and system
  • Malicious code query method and system
  • Malicious code query method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary and are intended to explain the present invention and should not be construed as limiting the present invention.

[0025] The method and system for querying network terminal threats according to the embodiments of the present invention will be described below with reference to the accompanying drawings. First, the method for querying malicious codes proposed according to the embodiments of the present invention will be described with reference to the accompanying drawings.

[0026] figure 1 It is a flowchart of a malicious code query method according to an embodiment of the present invention.

[0027] like figure 1 As shown, the query metho...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a malicious code query method and system, and the method comprises the following steps: carrying out the word segmentation of a to-be-detected sample, so as to obtain a word segmentation result of the to-be-detected sample; searching a preset data set for a similar set matched with the word segmentation results of the sample to be detected, the preset data set storing a plurality of word segmentation results in one-to-one correspondence with the plurality of malicious samples; comparing the fuzzy hash value of the sample to be detected with the fuzzy hash value of eachmalicious sample in the queried similar set; and when the similarity is greater than a preset threshold value, determining that the malicious sample in the similarity set is a malicious sample similarto the to-be-detected sample. According to the method, the word segmentation result of the sample to be detected is matched to obtain the similar set, so that the query time is effectively shortened,the calculation is simplified, and the query efficiency and applicability of malicious codes are effectively improved.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a malicious code query method and system. Background technique [0002] Related technologies realize malicious code query by matching and comparing hash values ​​in massive data. [0003] However, once the amount of data is too large, the fuzzy hash value algorithm of the related technology will have the problems of long time consumption and cumbersome calculation, resulting in low detection efficiency, which is not suitable for large-scale calculation comparison. In the era, the fuzzy hash algorithm of related technologies has limited improvement space and poor applicability. Contents of the invention [0004] The present invention aims to solve one of the technical problems in the related art at least to a certain extent. [0005] Therefore, an object of the present invention is to propose a malicious code query method, which effectively shortens the query time, si...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/56G06F17/27
CPCG06F21/562G06F40/289G06F16/2255
Inventor 邢宝玉李柏松王小丰
Owner HARBIN ANTIY TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products