Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Malicious software detection method and device, server and readable storage medium

A malicious software and malicious technology, applied in the field of software detection, can solve problems such as information security, threats to user personal and property safety, terminal privacy leakage, etc., to achieve the effect of avoiding leakage and improving efficiency

Inactive Publication Date: 2020-03-27
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF6 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, while these high-tech products enrich people's lives and provide convenience for people's lives, they also bring about some information security issues.
In order to achieve a certain purpose, some illegal software providers often distribute some malicious software in the network. When the user browses some malicious websites or downloads certain information, the malicious software will run in the user's terminal, and the Harass users, and may leak user information such as account passwords, seriously threatening the personal and property safety of users
[0003] In the existing technology, malware detection models are usually used to detect malware. However, current malware detection models use centralized acquisition of terminal logs or traffic data to uniformly train the initial model, which may easily lead to leakage of terminal privacy.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious software detection method and device, server and readable storage medium
  • Malicious software detection method and device, server and readable storage medium
  • Malicious software detection method and device, server and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The core of the present application is to provide a malware detection method, device, server and readable storage medium, which are used to avoid disclosure of terminal privacy during the malware detection process.

[0047] In order to make the purposes, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments It is a part of the embodiments of this application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0048] Please refer to figure 1 , figure 1 It is a flow chart of a malware detection method provided in the embodiment of the p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a malicious software detection method, which comprises the steps of sending a model construction command to each terminal, and obtaining model parameters of a malicious detection model of each terminal; determining an optimal model parameter according to each model parameter; and sending the optimal model parameters to each terminal, so that each terminal determines an optimal malicious detection model according to the optimal model parameters, and performs malicious software detection by using the optimal malicious detection model. The technical scheme obtains local data through each terminal to train a malicious detection model, and determines an optimal malicious detection model according to model parameters of each terminal to complete malicious software detection, wherein training of the malicious detection model is carried out in each terminal, and a server does not need to acquire local data in the terminal, so that leakage of terminal privacy is avoided,and the efficiency of model training is improved. The invention also provides a malicious software detection device, a server and a readable storage medium, which have the above beneficial effects.

Description

technical field [0001] The present application relates to the field of software detection, in particular to a method, device, server and readable storage medium for malware detection. Background technique [0002] With the development of communication technology, the application of mobile terminals, such as smart phones, tablet computers and other devices, is becoming more and more common. It can be said that they have gradually become an indispensable part of people's life. However, while these high-tech products enrich people's life and provide convenience for people's life, they also bring some information security problems. In order to achieve a certain purpose, some illegal software providers often distribute some malicious software in the network. When the user browses some malicious websites or downloads certain information, the malicious software will run in the user's terminal, and the Harassing users, and in severe cases, may leak user information such as account ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/56G06F21/62H04L29/06
CPCG06F21/562G06F21/6245H04L63/1416H04L63/1425H04L63/145
Inventor 刘博范渊
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products