Malicious software detection and classification model generation method and device

A classification model and malicious software technology, applied in computer security devices, computer components, character and pattern recognition, etc., can solve problems such as high false detection rate, low detection efficiency, user personal privacy information and user property damage

Pending Publication Date: 2020-07-07
BEIJING QIHOO TECH CO LTD
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, many criminals can use malicious software to conduct network attacks on users, such as stealing users' personal privacy information, downloading and executing malicious programs such as viruses, Trojan horses, and worms. great harm
[0003] At present, malware is mainly detected through the heuristics of ch

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious software detection and classification model generation method and device
  • Malicious software detection and classification model generation method and device
  • Malicious software detection and classification model generation method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] Exemplary embodiments of the present invention will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present invention are shown in the drawings, it should be understood that the invention may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present invention and to fully convey the scope of the present invention to those skilled in the art.

[0020] An embodiment of the present invention provides a method for generating a classification model, using deep learning (Deep Learning) technology, by performing deep learning on the software icons of a large number of software and the feature images of a large number of URLs used to download software, to obtain the identification of malicious software classification model. The method can be applied to various occasions where software icons ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An embodiment of the invention provides a malicious software detection method, a classification model generation method, a malicious software detection device and a classification model generation device. The malware detection method comprises the steps of: acquiring image data of unknown software, wherein the image data comprises at least one of a software icon of the unknown software and a feature image used for downloading a uniform resource locator (URL) of the unknown software; detecting the image data by using a classification model generated through deep learning in advance to obtain adetection value corresponding to the unknown software; and determining whether the unknown software is malicious software or non-malicious software according to the detection value. Therefore, the malicious software can be quickly and accurately detected.

Description

technical field [0001] The embodiments of the present invention relate to the field of Internet computer security protection, and in particular to a malware detection and classification model generation method and device. Background technique [0002] In recent years, with the rapid development of mobile Internet technology, especially the popularization of electronic devices such as smart phones, tablet computers, and computers, various types of software have emerged as the times require. For example, along with the popularization of Android mobile phones, APKs (Android Package, Android installation package) with various functions have emerged, that is, software installed on Android terminals. However, many criminals can use malicious software to conduct network attacks on users, such as stealing users' personal privacy information, downloading and executing malicious programs such as viruses, Trojan horses, and worms. Great harm. [0003] At present, malware is mainly de...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/56G06K9/62
CPCG06F21/562G06F2221/033G06F18/24G06F18/214
Inventor 卢加磊翟科科高吴林涧
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products