Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Malicious code detection method and system

A malicious code detection and malicious code technology, applied in the field of software security detection, can solve problems such as inability to accurately identify malicious software, and achieve the effect of improving training and detection efficiency and high detection accuracy

Active Publication Date: 2019-10-18
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF4 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The invention provides a method and system for detecting malicious codes, which can accurately detect whether the software contains malicious codes without being affected by the transformation of malicious code instructions, so as to solve the problem of being unable to accurately identify whether an unknown software is malicious in the prior art software problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious code detection method and system
  • Malicious code detection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] Because part of the sample data set involved is a malicious program, which may cause harm to the terminal computer, the construction of the entire system and the execution of the method are executed under a virtual machine. In this embodiment, VMware Workstations software is selected, which can easily and conveniently build the environment required by this embodiment.

[0033] Such as figure 1 Shown the present invention to malicious code detection system, comprises:

[0034] Preprocessing module: used to obtain the characteristics of PE files, including opcodes, API call sequences and PE file header fields;

[0035] Feature processing module: used to receive the output of the preprocessing module, and perform dimensionality reduction processing on the feature through a stacked noise reduction autoencoder to obtain a feature vector after dimensionality reduction;

[0036] Deep learning modeling module: According to the features of the binary data of the PE file and th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a malicious code detection method and system. The method comprises the steps that A, extracting corresponding features from binary data of a single PE file in a training dataset; b, performing dimension reduction processing on the features; c, extracting the features of the binary data as the front half part of the deep learning model through a gated convolutional network; d, combining the features after dimension reduction with the feature vectors obtained in the step C, inputting the combined features into a full-connection neural network serving as the rear half part of the deep learning model, and generating final feature vectors to be classified; e, generating corresponding to-be-classified feature vectors for all PE files; and F, classifying all the to-be-classified feature vectors, comparing the classified feature vectors with known categories in the test data set to verify the correctness of the deep learning model, and obtaining an optimal deep learning model by adjusting parameters. According to the method, the influence of malicious code instruction transformation can be avoided, whether the unknown software contains the malicious code or not can be accurately detected, and the detection efficiency is also improved.

Description

technical field [0001] The invention relates to a method and a system for software safety detection, in particular to a method and a system for detecting malicious codes. Background technique [0002] In the anti-virus research and the confrontation process of malicious code, the continuous development of malicious code technology has also promoted the continuous development and progress of malicious program detection technology, and the new malicious code writing technology has also led to the emergence of new detection technology. [0003] Deep learning has achieved good results in both computer vision and speech recognition. In terms of computer vision, Krizhevsky et al. proposed the use of deep convolutional neural networks for image classification, Farabet proposed a method for hierarchically learning scene labels, and Kavukcuoglu proposed a convolution recognition method for visual functions. [0004] N-gram is a concept in the field of natural language processing, an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/56G06K9/62G06N3/04
CPCG06F21/562G06N3/045G06F18/241
Inventor 张小松牛伟纳赵凌园李子豪罗宇恒杨淳
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products