Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Propagation prediction method for malicious software

A malware and propagation prediction technology, applied in the field of Internet applications, can solve the problem of not fully considering the influence of the accuracy of user node feature extraction, and achieve the effect of accurate control

Active Publication Date: 2021-06-29
CHONGQING UNIV OF POSTS & TELECOMM
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Based on the classic SIR propagation dynamics research malware propagation prediction is based on the network structure and user node attributes to extract features, but does not fully consider the impact of potential interactions between user nodes on the accuracy of feature extraction
Models based on machine learning or neural networks often ignore the diversity of user relationships and user behaviors in the malware propagation network, resulting in the need to explicitly extract the infection intensity between users and the influence of different malware

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Propagation prediction method for malicious software
  • Propagation prediction method for malicious software
  • Propagation prediction method for malicious software

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0025] The present invention is a method for predicting the propagation of malicious software. The present invention combines the process of social network topic propagation to improve the existing method for predicting the propagation of malicious software, so as to effectively predict the behavior of node groups for the propagation of various malicious software in the network , and excavate the influence of different characteristics of nodes on the propagatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of internet application, and particularly relates to a propagation prediction method for malicious software. The method comprises the steps of obtaining user nodes in a database and interaction data of the user nodes, and extracting propagation attributes of the user nodes; learning a user behavior feature vector of the user node from a paragraph formed by user node propagation contents by adopting a Doc2vec algorithm; adopting a vectorization algorithm Tensor2vec based on tensor decomposition to learn a user node network structure feature vector from the malicious software propagation network; and performing propagation prediction on the malicious software in the graph convolutional neural network, and predicting whether the malicious software is propagated to a user node and the propagation trend of the malicious software. According to the method, the problem of inaccurate calculation precision caused by data sparsity is considered, the infection intensity between the user nodes is calculated by adopting a tensor decomposition method, and the malicious software propagation spatial feature information is mined by utilizing a representation learning method, so that propagation prediction of the malicious software can be effectively carried out.

Description

technical field [0001] The invention belongs to the field of Internet application technology, relates to network and information security technology, and in particular to a method for predicting the spread of malicious software. Background technique [0002] In recent years, the amount and harm of malware have increased dramatically, and its threat to networks and user nodes is considered to be one of the most significant risks in the coming years. Early malware was mainly limited to computer viruses, but with the development of the Internet and the diversification of network attacks, the concept of malware has surpassed the traditional narrow concept, especially with the advanced persistent threat (Advanced Persistent Threat, referred to as APT) ), Supply Chain Attacks (Supply Chain Attacks, SCA for short), botnets and ransomware and other malware, malware has highlighted its proprietary, control and destructiveness to the target. [0003] In addition, three years after th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/145H04L63/1416H04L63/20
Inventor 李暾万鑫黄梦阳刘红卢星宇肖云鹏
Owner CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products