Malicious communication detection method, device, computer equipment and storage medium

A communication detection and malicious technology, applied in the computer field, can solve the problem of low accuracy in detecting malicious communication, and achieve the effect of improving accuracy

Active Publication Date: 2021-11-30
TENCENT TECH (SHENZHEN) CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method of identifying malicious communication is easily bypassed by attackers, resulting in low accuracy in detecting malicious communication from a large number of access requests

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious communication detection method, device, computer equipment and storage medium
  • Malicious communication detection method, device, computer equipment and storage medium
  • Malicious communication detection method, device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0042] The malicious communication detection method provided by this application can be applied to such as figure 1 shown in the application environment. Wherein, the terminal 102 may send an access request to the external server 106 through the network, so as to communicate with the external server 106 . During the communication process between the terminal 102 and the external server 106 , the internal server 104 may obtain an access request from the terminal 102 to communicate with the external server 106 through the switch 108 . The internal server 104 may obtain req...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present application relates to a malicious communication detection method, device, computer equipment and storage medium. The method includes: obtaining request data corresponding to multiple access requests within a preset time period; performing feature extraction on the request data to obtain request features of multiple dimensions; inputting the request features of the multiple dimensions into a malicious detection model , the malicious detection model includes a historical detection model and a similar detection model; performing malicious detection on the request feature through the historical detection model to obtain a first detection result; performing malicious detection on the request feature through the similar detection model , to obtain a second detection result; correcting the first detection result and the second detection result to obtain a malicious communication detection result. The method can effectively improve the accuracy of detecting malicious communication from a large number of access requests.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to a malicious communication detection method, device, computer equipment and storage medium. Background technique [0002] With the development of computer technology, various kinds of software have sprung up, including malicious software that infringes upon the legitimate rights and interests of users. Malware usually hides its malicious communication behavior in a large number of access requests. Traditionally, malicious communications have been identified based on malware samples. However, this method of identifying malicious communication is easily bypassed by attackers, thus resulting in low accuracy in detecting malicious communication from a large number of access requests. Contents of the invention [0003] Based on this, it is necessary to provide a malicious communication detection method, device, computer equipment and storage medium capable of improving ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06F21/56
CPCG06F21/562G06F21/566H04L63/1416
Inventor 郭豪陈嘉豪梁玉洪春华
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products