Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Malware Propagation Prediction Method

A malware and propagation prediction technology, applied in the field of Internet applications, can solve the problem of not fully considering the influence of the accuracy of user node feature extraction, and achieve the effect of accurate control

Active Publication Date: 2022-07-01
CHONGQING UNIV OF POSTS & TELECOMM
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Based on the classic SIR propagation dynamics research malware propagation prediction is based on the network structure and user node attributes to extract features, but does not fully consider the impact of potential interactions between user nodes on the accuracy of feature extraction
Models based on machine learning or neural networks often ignore the diversity of user relationships and user behaviors in the malware propagation network, resulting in the need to explicitly extract the infection intensity between users and the influence of different malware

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Malware Propagation Prediction Method
  • A Malware Propagation Prediction Method
  • A Malware Propagation Prediction Method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, but not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0025] The present invention is a method for predicting the spread of malware. The present invention improves the existing method for predicting the spread of malware in combination with the process of topic spreading in social networks, so as to effectively predict the group behavior of nodes spread by various malware in the network. , and excavate the influence of different characteristics of nodes on the propagation situation; in or...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of Internet applications, and in particular relates to a method for predicting the propagation of malicious software; the method includes acquiring user nodes and their interaction data in a database, and extracting the propagation attributes of the user nodes; using Doc2vec algorithm to propagate content from the user nodes The user behavior feature vector of the user node is learned from the composed paragraphs; the vectorization algorithm Tensor2vec based on tensor decomposition is used to learn the user node network structure feature vector from the malware propagation network; the malware is carried out in the graph convolutional neural network. Propagation prediction, and predict whether the malware is propagated to user nodes and the propagation trend of the malware; the present invention takes into account the problem of inaccurate calculation accuracy caused by data sparseness, and uses a tensor decomposition method to calculate the communication between user nodes. Infection intensity, and use the representation learning method to mine the spatial feature information of malware spread, which can effectively predict the spread of malware.

Description

technical field [0001] The invention belongs to the technical field of Internet applications, relates to network and information security technologies, and in particular relates to a method for predicting the spread of malicious software. Background technique [0002] The amount and harm of malware has increased dramatically in recent years, and its threat to the network and user nodes is considered one of the most significant risks in the coming years. Early malware was mainly limited to computer viruses, but with the development of the Internet and the diversification of network attacks, the concept of malware has transcended the traditional narrow concept, especially with the development of Advanced Persistent Threat (APT). ), Supply Chain Attacks (SCA), botnets and ransomware and other malware have emerged, and malware has highlighted its proprietary, controlled and destructive targets. [0003] Additionally, ransomware infection rates declined for the first time three ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/145H04L63/1416H04L63/20
Inventor 李暾万鑫黄梦阳刘红卢星宇肖云鹏
Owner CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products