Risk application detection method and device and server

A technology for risk and target applications, applied in computer security devices, instruments, character and pattern recognition, etc., can solve problems such as no solution, inability to accurately detect and identify risk applications, and missed detection, to reduce detection errors, The effect of protecting data security and improving detection accuracy

Pending Publication Date: 2021-07-09
INDUSTRIAL AND COMMERCIAL BANK OF CHINA
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

As a result, the above-mentioned risky applications cannot be accurately detected and identified based on existin

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Risk application detection method and device and server
  • Risk application detection method and device and server
  • Risk application detection method and device and server

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0062] In order to better understand the technical solution in the present specification, the technical solutions in the present specification are clear and completely described below in conjunction with the drawings in the present specification. The embodiment is merely a part of the embodiments of the present specification, not all of the embodiments. Based on the embodiments in this specification, one of ordinary skill in the art will belong to all other embodiments obtained by creative labor, and should belong to the scope of this specification.

[0063] The present specification embodiment provides a method of detecting a risk application, and the detection method of the risk application can be applied to a system comprising a server and a detection terminal. Specific, you can see figure 1 Indicated. The server and the detection terminal can be connected by wired or wireless to perform specific data interactions.

[0064] In the present embodiment, the server can specifically...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a risk application detection method and device and a server. Based on the method, before specific implementation, a positive sample path set and a negative sample path set can be used for training a corresponding preset first path processing model, a preset second path processing model and a preset classification model; during specific implementation, a target application can be subjected to preset static analysis firstly, and a key API based on the target application and a plurality of API calling paths related to the key API are determined; then, the preset first path processing model and the preset second path processing model are called for processing the API calling paths to obtain and utilize suspicious degree parameters of the API calling paths and construct a suspicious degree feature vector about the target application; and a preset classification model is called to process the suspicious degree feature vector, and determine whether the target application is a risk application. Therefore, the risk application injected with a small number of malicious codes can be accurately and efficiently detected and identified.

Description

technical field [0001] This specification belongs to the field of artificial intelligence technology, and in particular relates to detection methods, devices and servers for risky applications. Background technique [0002] When detecting risky applications (for example, malicious Android software, etc.), most of the existing methods start from the perspective of the application as a whole and perform feature extraction on the overall code of the application to determine whether the application is a risky application. [0003] However, in order to avoid being detected and identified, some risky applications will inject a small amount of malicious code into the application code, and use the overall characteristics of most of the normal code in the application to hide the partial characteristics of a small part of the malicious code. As a result, the above risk applications cannot be accurately detected and identified based on existing methods, and missed detection occurs. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/56G06K9/62
CPCG06F21/563G06F18/24G06F18/295G06F18/214
Inventor 黄思创林欢哲俞丽萍田晓燕
Owner INDUSTRIAL AND COMMERCIAL BANK OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products