Malicious code classification method based on graph convolution network and topic model
A malicious code and topic model technology, applied in biological neural network models, neural learning methods, character and pattern recognition, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0017] The present invention classifies malicious codes based on graph convolutional networks and theme models, and is mainly aimed at malicious codes in PE format under the windows system. Firstly, the function call graph and function instruction distribution of the malicious code are extracted, and then input into the classification model for family classification. The classification model includes multi-layer graph convolutional network, attention layer, topic layer, pooling layer, fully connected layer and Softmax layer. In order to further illustrate the specific implementation of the present invention, it will be described in detail in conjunction with the accompanying drawings. The invention proposes a malicious code homology analysis method based on a graph convolutional network and a topic model, which can reduce the matching complexity of a function call graph.
[0018] Extract the function call graph of the malicious code: First, traverse all functions of the malic...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


