Unlock instant, AI-driven research and patent intelligence for your innovation.

Abnormal data identification method, device, computing device and medium

A technology of abnormal data and identification method, applied in the computer field, can solve problems such as the reduction of analysis efficiency, and achieve the effect of improving detection efficiency

Active Publication Date: 2022-03-25
BEIJING QIANXIN TECH +1
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In particular, remote control Trojan horses are particularly prominent, because of their stronger concealment and persistence, which reduces the efficiency of discovering malicious program samples and analyzing host behavior

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Abnormal data identification method, device, computing device and medium
  • Abnormal data identification method, device, computing device and medium
  • Abnormal data identification method, device, computing device and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] Hereinafter, embodiments of the present disclosure will be described with reference to the accompanying drawings. It should be understood, however, that these descriptions are merely exemplary, and not to limit the scope of the disclosure. In the following detailed description, many specific details are set forth to provide a comprehensive understanding of the embodiments of the present disclosure. However, it is clear that one or more embodiments may be implemented without these specific details. Further, in the following description, a description of the well-known structure and techniques is omitted to avoid unnecessarily obscuring the concepts of the present disclosure.

[0034] The terminology used herein is merely to describe specific embodiments, and is not intended to limit the disclosure. The terms "including", "comprising", "comprising", etc., indicating the presence of the features, steps, operations, and / or components, but does not exclude presence or addition...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The disclosure provides a method for identifying abnormal data, including: acquiring target data, the target data includes data generated when the first device and the second device perform data interaction; determining whether the target data includes target period information, and using the target period information In order to characterize the periodic abnormal data interaction between the first device and the second device; and in response to determining that the target data includes target period information, determine that the data interaction between the first device and the second device is an abnormal interaction. The present disclosure also provides an identification device for abnormal data, a computing device, a medium and a computer program product.

Description

Technical field [0001] The present disclosure relates to the field of computer technology, and more particularly to an identification method of abnormal data, an identification device of an abnormal data, a computing device, and a computer readable storage medium. Background technique [0002] At present, common Trojan detection software, most of which identify Trojans based on programming techniques. Safety analysts analyze their host behavior by collecting malicious samples to extract their sample characteristics. The detection and protection of Trojans is achieved by upgrading the feature library. Due to the rapid variation of Trojans, spreading and attack methods are also more diverse. In particular, the remote control Trojans are particularly highlighted, which have more stronger concealedness and persistence, making the discovery of malicious procedures and the main behavior analysis efficiency. [0003] Therefore, how to quickly obtain malicious data from massive data to a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40G06F21/56
CPCH04L63/1425H04L63/145H04L63/0236G06F21/562
Inventor 张晓阳罗晶吴亚东
Owner BEIJING QIANXIN TECH