Feature code extraction method and device, computer equipment and readable storage medium
An extraction method and signature technology, which is applied in the field of security threat processing, can solve the problems of slowing down the extraction speed of signatures, lack of automation, and consuming manpower of enterprises, so as to achieve the effect of automatic extraction, improving efficiency and accuracy
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0033] The embodiment of the present invention provides a feature code extraction method. In a usage scenario, the unknown code to be detected is detected by this method, and when it is detected that the code to be detected belongs to malicious code, the feature of the malicious code is extracted. code; in another usage scenario, this method can be used to extract known malicious code signatures, or it can also be applied to other scenarios. No matter in which usage scenario, this method can improve the performance of signature extraction. Efficiency and accuracy, specifically, the feature code extraction method provided in this embodiment includes the following steps S101 to S107.
[0034] Step S101: Read the code to be detected in binary format to form an original byte sequence.
[0035] Optionally, when the code to be detected is in binary format, directly read the code to be detected in binary format in bytes, and when the code to be detected is not in binary format, first...
Embodiment 2
[0072] On the basis of the first embodiment above, the second embodiment of the present invention provides a preferred feature code extraction method, and some technical features can refer to the related description of the first embodiment above. In this embodiment, the extraction of the characteristic code of the malicious code is carried out for the existing malicious code data set, image 3 The flow chart of the feature code extraction method provided by Embodiment 2 of the present invention, such as image 3 As shown, the feature code extraction method provided by this embodiment includes the following steps:
[0073] (1) The generator, including a downloader and a processor, completes the download and preprocessing of the original malicious code data set through the generator, and outputs the malicious code set to be trained and the malicious code set to be extracted.
[0074] (2) A learner, constructing a training data set based on the malicious data set to be trained a...
Embodiment 3
[0118] Corresponding to Embodiment 1 above, Embodiment 3 of the present invention provides a feature code extraction device. For the corresponding technical features and corresponding technical effects, refer to Embodiment 1 and Embodiment 2 above, and this Embodiment 3 will not be repeated. Figure 5 The block diagram of the feature code extracting device provided for the third embodiment of the present invention, such as Figure 5 As shown, the device includes: a reading module 301 , a conversion module 302 , an input module 303 , an acquisition module 304 , a first calculation module 305 , a second calculation module 306 and a determination module 307 .
[0119] The reading module 301 is used to read the code to be detected in the binary format in the form of bytes to form the original byte sequence; the conversion module 302 is used to convert the original byte sequence to form a conversion sequence; the input module 303 is used to Input the converted sequence to the prese...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


