Unlock instant, AI-driven research and patent intelligence for your innovation.

Process detection method and system for application program

An application program and detection method technology, applied in the computer field, can solve the problem that the malicious program source code detection technology cannot be effectively detected, and achieve the effect of making up for the low accuracy rate

Active Publication Date: 2020-05-22
BEIJING UNIV OF POSTS & TELECOMM +1
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Among them, there are a large number of variants of some malicious programs and malicious program source codes, and the existing malicious program source code detection technology cannot effectively detect them.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Process detection method and system for application program
  • Process detection method and system for application program
  • Process detection method and system for application program

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0049] figure 1 A schematic flowchart of a process detection method for an application program provided by an embodiment of the present invention, such as figure 1 As shown, the embodiment of the present invention provides a process detection method for application programs, including:

[0050] Step 101, according to the content of the security ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a process detection method and system for an application program, and the method comprises the steps: obtaining an observable behavior vector corresponding tothe process according to the content of a safety log; converting the observable behavior vector into a process behavior feature map; and detecting the process behavior feature map based on a trained convolutional neural network model to obtain a detection result of the process, wherein the trained convolutional neural network model is obtained by training a sample process behavior characteristic graph marked with a normal process label and a process behavior characteristic graph marked with a malicious process label. The abnormal process can be effectively identified, the defect of low accuracy of identifying the abnormal process through a manual technology in the prior art is overcome, and the method has good adaptability and relatively high robustness for different types of malicious processes.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a process detection method and system for application programs. Background technique [0002] In recent years, the number of malicious programs has grown exponentially, and has become one of the key factors threatening Internet security. How to effectively detect and kill malicious programs has also become one of the most important issues for enterprises and network security personnel. With the continuous development and improvement of artificial intelligence technology, how to apply artificial intelligence technology to malicious program detection and realize self-inspection in unsupervised or semi-supervised mode of the system has become one of the needs of current enterprises. [0003] For the detection and killing of malicious programs, most current technologies analyze the source code of malicious programs, extract corresponding features, and then scan and kill malicious ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56G06N3/04G06N3/08
CPCG06F21/56G06N3/08G06N3/045
Inventor 张文博杨松朱鼎成徐秀兰胡冰城孙志敏雷凯程艳邓晏宁张晓光唐先锋
Owner BEIJING UNIV OF POSTS & TELECOMM
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More