Unlock instant, AI-driven research and patent intelligence for your innovation.

Malicious sample identification method and device, computing equipment and medium

An identification method and sample technology, applied in the computer field, can solve problems such as difficult to accurately identify the risk category of malicious samples, difficult to obtain, and difficult to obtain effective characteristic data, so as to achieve the effects of improving recognition accuracy, increasing diversity, and improving technical effects

Pending Publication Date: 2021-01-15
BEIJING QIANXIN TECH +1
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in order to avoid security detection, the important features of malicious samples are usually hidden and difficult to obtain, especially when the malicious samples have complex file formats, it is difficult to obtain the effective characteristic data of the malicious samples through simple analysis methods, making it difficult to accurately identify The risk category to which the malicious sample belongs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious sample identification method and device, computing equipment and medium
  • Malicious sample identification method and device, computing equipment and medium
  • Malicious sample identification method and device, computing equipment and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] Hereinafter, embodiments of the present disclosure will be described with reference to the drawings. It should be understood, however, that these descriptions are exemplary only, and are not intended to limit the scope of the present disclosure. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the present disclosure. It may be evident, however, that one or more embodiments may be practiced without these specific details. Also, in the following description, descriptions of well-known structures and techniques are omitted to avoid unnecessarily obscuring the concept of the present disclosure.

[0033] The terminology used herein is for the purpose of describing particular embodiments only, and is not intended to be limiting of the present disclosure. The terms "comprising", "comprising", etc. used herein indicate the presence of stated features, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a malicious sample identification method. The malicious sample identification method comprises the steps of obtaining a malicious file; running the malicious file to obtain a running result; analyzing the malicious file to obtain attribute information of the malicious file; based on the operation result and the attribute information, determining feature data of the malicioussample; and based on the feature data, identifying a risk category to which the malicious sample belongs. The invention further provides a malicious sample recognition device, computing equipment, acomputer readable storage medium and a computer program product.

Description

technical field [0001] The present disclosure relates to the field of computer technology, and more specifically, to a malicious sample identification method, a malicious sample identification device, a computing device, and a computer-readable storage medium. Background technique [0002] When analyzing a malicious sample, it is usually necessary to obtain characteristic data of the malicious sample, and identify the characteristic data to obtain a risk category of the malicious sample. However, in order to avoid security detection, the important features of malicious samples are usually hidden and difficult to obtain, especially when the malicious samples have complex file formats, it is difficult to obtain the effective characteristic data of the malicious samples through simple analysis methods, making it difficult to accurately identify The risk category to which the malicious sample belongs. Contents of the invention [0003] In view of this, the present disclosure ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/53G06F21/56G06K9/62
CPCG06F21/53G06F21/56G06F18/23G06F18/214G06F18/24
Inventor 白敏刘爽白皓文白子潘汪列军
Owner BEIJING QIANXIN TECH