Malicious code detection method, data interaction method and related equipment

A malicious code detection and malicious code technology, applied in the fields of data interaction methods and related equipment, malicious code detection methods, can solve the problems of being easily evaded and low recognition rate, and achieve the effect of improving the recognition rate

Active Publication Date: 2021-04-20
卓尔智联(武汉)研究院有限公司
View PDF8 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this detection method has the problem of being easily evaded, and the recognition rate is low. Hackers can evade detection by inserting characters or completely encoding, such as adding multiple tab keys, adding (space) cha

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious code detection method, data interaction method and related equipment
  • Malicious code detection method, data interaction method and related equipment
  • Malicious code detection method, data interaction method and related equipment

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0055]In order to make the purpose, technical solutions and advantages of the present application, the present application will be described in further detail below with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are intended to explain the present application and is not intended to limit the present application.

[0056]The malicious code detection method provided herein can be applied tofigure 1 The application environment is shown. The application environment relates to terminal 102 and server 104, terminal 102, and server 104 through a network connection. The user can access the web page through the terminal 102, and the server 104 can a web server. The terminal 102 and server 104 can perform malicious code detection. In one embodiment, the server 104 detects whether the page request data exists before the page request data transmitted by the terminal 102. When the page request data does not have malic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a malicious code detection method, a data interaction method and related equipment. The malicious code detection method comprises the steps of obtaining a to-be-detected code; vectorizing the to-be-detected code to obtain a vector corresponding to the to-be-detected code; performing feature extraction on the vector through a text classification model, and performing classification recognition based on the extracted features to obtain a category recognition result corresponding to the to-be-detected code, wherein the category identification result comprises identified code categories and corresponding category probabilities, and the code categories comprise malicious codes and normal codes; and if the category probability corresponding to the malicious code in the category identification result is greater than a preset threshold, determining that the to-be-detected code is the malicious code. By adopting the method, the malicious code recognition rate can be improved.

Description

technical field [0001] The present application relates to the technical field of information security, in particular to a malicious code detection method, a data interaction method and related equipment. Background technique [0002] Cross Site Scripting (Cross Site Scripting, abbreviated as XSS) attack is a common web application security vulnerability. This type of vulnerability can allow attackers to embed malicious script code into pages that normal users will visit. When normal users visit the page When this happens, it can lead to the execution of embedded malicious script code, thereby achieving the purpose of maliciously attacking users. [0003] XSS vulnerabilities can be divided into three types: local exploitation vulnerabilities, reflection vulnerabilities and storage vulnerabilities according to different attack methods. The local exploit resides in the client-side script itself within the page. Reflective vulnerabilities are somewhat similar to local exploita...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/56G06F16/35G06N3/08
Inventor 石奕
Owner 卓尔智联(武汉)研究院有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products