Malicious software identification method and system based on multi-model features and related device
A malicious software and identification method technology, applied in computer security devices, instruments, electronic digital data processing and other directions, can solve problems such as poor use effect and inability to identify new malicious content, and achieve the effect of increasing identification accuracy
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0052] The following combination figure 1 , figure 1 It is a flow chart of a method for identifying malware based on multi-model features provided by the embodiment of the present application.
[0053] It specifically includes the following steps:
[0054] S101: performing feature extraction on each PE file in the software to be tested using each feature extraction model in a preset feature extraction model set to obtain each original feature;
[0055] This step aims to use each feature extraction model in the preset feature extraction model set to the same PE file (Portable Executable, portable executable file, common EXE, DLL, OCX, SYS, COM are all PE files, PE The file is a program file on the Microsoft Windows operating system) to perform feature extraction respectively, and obtain the original features corresponding to each feature extraction model.
[0056] Combined with the classification of PE files, PE files can be divided into multiple categories according to diff...
Embodiment 2
[0071] The following combination figure 2 , figure 2 It is a flow chart of another malware identification method based on multi-model features provided by the embodiment of the present application.
[0072] S201: Determine whether the PE file is allowed to be executed in the current test environment;
[0073] S202: Simultaneously use the binary feature extraction model, character string feature extraction model, assembly code feature extraction model and dynamic feature extraction model to perform feature extraction on the PE file respectively;
[0074] This step is based on the judgment result of S201 on the current test environment that the PE file can be executed, so the requirements for using the dynamic feature extraction model are met, and the above four different feature extraction models can be used for feature extraction.
[0075] S203: Simultaneously use the binary feature extraction model, character string feature extraction model and assembly code feature extra...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


