Malicious program identification method based on improved support vector machine

A technology of support vector machines and malicious programs, which is applied in the field of malicious program identification of support vector machines, and can solve problems such as high latency

Active Publication Date: 2020-10-27
JIANGSU UNIV
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These technologies scan the malicious attacks that may appear in the network and analyze them after obtaining the corresponding data, which has a high delay. At the same time, the final test results of classificatio

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious program identification method based on improved support vector machine
  • Malicious program identification method based on improved support vector machine
  • Malicious program identification method based on improved support vector machine

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The present invention will be further elaborated below through the accompanying drawings and specific steps.

[0031] The purpose of the present invention is to provide a kind of malicious program identification method based on the improved support vector machine for the malicious programs that exploit loopholes in the network traffic, effectively complete the identification of malicious programs, provide NTMI identification algorithm, and Sufficient experiments are carried out, which also prove the feasibility and effectiveness of the method.

[0032] Such as figure 2 As shown, the malicious program identification method based on the improved support vector machine of the present invention includes:

[0033] Step 201 collects the data in the network flow by Netflow, and carries out data standardization to the collected data packets;

[0034] In step 202, in order to complete the identification of malicious programs, feature extraction is required;

[0035] In step 20...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a malicious program identification method based on an improved support vector machine, which comprises the following steps of: acquiring data in network traffic through Netflow,and normalizing an acquired data packet; in order to complete identification of a malicious program, carrying out feature extraction; in order to eliminate redundant features, carrying out feature attribute dimension reduction, and carrying out normalization processing; carrying out classification training by an OFSVM algorithm; and finally, constructing a network traffic identification model byusing an NTMI identification algorithm, and finally realizing identification of malicious programs in the network traffic.

Description

technical field [0001] The invention belongs to the field of detecting malicious programs in network traffic, and relates to a method for identifying malicious programs based on an improved support vector machine. Background technique [0002] With the continuous growth of the population, the scale of the network is expanding day by day, and the network traffic is filled with all kinds of complicated data. Some thieves use some loopholes in the network to carry out network attacks, resulting in the leakage of important information. As well as the security problem of illegal access, what's more, it paralyzes the enterprise system and brings great troubles to people's lives. [0003] In this huge network traffic, network malicious attackers will publish some phishing websites or worm viruses to steal important information of users, and then use these vulnerabilities to convert normal programs into malicious programs, thereby causing the user's host to be controlled by hackers ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/851G06F21/56G06K9/62
CPCH04L63/1416H04L47/2441G06F21/56H04L63/145G06F2221/033G06F18/2411
Inventor 陈锦富殷上张祖法黄如兵杨健
Owner JIANGSU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products