Container malicious behavior detection method and device
A container and behavioral technology, applied in the computer field, can solve the threat of malware and other problems, achieve the effect of preventing intrusion, improving security, and preventing container operation
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0042] In order to make the object, technical solution and advantages of the present invention clearer, the embodiments of the present invention will be further described in detail below in conjunction with specific embodiments and with reference to the accompanying drawings.
[0043] Based on the above purpose, the first aspect of the embodiments of the present invention proposes an embodiment of a method for container malicious behavior detection. figure 1 Shown is a schematic flow chart of the method.
[0044] like figure 1 As shown in , the method may include the following steps:
[0045] S1 collects a sample set of container behavior and establishes a container behavior library, and obtains a container behavior sample set by pre-running a container with normal software (non-malicious) and a container with malware;
[0046] S2 uses the behavior library as a deep learning sample library, and uses multiple learning algorithms to train and combine to obtain a container beha...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com