Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Malicious file identification method and device, equipment and storage medium

A malicious file and identification method technology, applied in the field of malicious file identification, can solve the problem of high memory usage, and achieve the effect of solving the problem of excessive running memory

Pending Publication Date: 2021-06-01
SANGFOR TECH INC
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The main purpose of the present invention is to provide a malicious file identification method, device, equipment and storage medium, aiming to solve the technical problem of excessive memory usage in the prior art for malicious file identification

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious file identification method and device, equipment and storage medium
  • Malicious file identification method and device, equipment and storage medium
  • Malicious file identification method and device, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0045] refer to figure 1 , figure 1 It is a schematic structural diagram of a malicious file identification device in the hardware operating environment involved in the solution of the embodiment of the present invention.

[0046] Such as figure 1 As shown, the malicious file identification device may include: a processor 1001 , such as a central processing unit (Central Processing Unit, CPU), a communication bus 1002 , a user interface 1003 , a network interface 1004 , and a memory 1005 . Wherein, the communication bus 1002 is used to realize connection and communication between these components. The user interface 1003 may include a display screen (Display), an input unit such as a keyboard (Keyboard), and the optional user interface 1003 may also include a standard wired interface and a wireless interface. The ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of malicious file identification, and discloses a malicious file identification method and device, equipment and a storage medium. The method comprises: obtaining a sample file, and performing feature extraction on the sample file to obtain a first feature of the sample file; obtaining a second feature subjected to dimension reduction processing according to the first feature based on a memory mapping mode; and performing artificial intelligence prediction on the sample file according to the second feature to identify whether the sample file is a malicious file. Compared with an existing mode that all the features of the sample file are loaded into a memory for feature dimension reduction, and then the malicious file is recognized. The method can effectively solve the problem that the running memory is too high when the malicious file is recognized.

Description

technical field [0001] The present invention relates to the technical field of malicious file identification, in particular to a malicious file identification method, device, equipment and storage medium. Background technique [0002] When identifying malicious files, it is usually necessary to perform dimensionality reduction first. Some algorithms tend to perform poorly on high-dimensional data, and dimensionality reduction can improve the usability of algorithms. Dimensionality reduction can solve the multicollinearity problem by deleting redundant features. The dimensionality reduction model usually has a more complex data structure. For example, the original data structure consists of first-order features, vector dimension information of first-order features corresponding to second-order features, and number of first-order features. , the number of second-order features, etc., and the vector dimension usually includes information such as dimension coordinates and weight...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56G06K9/62
CPCG06F21/562G06F18/241
Inventor 刘彬彬杨达明李泽莹
Owner SANGFOR TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products