Unlock instant, AI-driven research and patent intelligence for your innovation.

An Intelligent Analysis Method of Malicious Files Based on Generative Adversarial Networks

A malicious file and intelligent analysis technology, applied in the field of information security, can solve problems such as seldom considering timing characteristics such as synchronization and correlation, analysis technology is difficult to meet high detection rate, and label sample acquisition is difficult, so as to enhance detection ability and improve Improve detection accuracy and improve the effect of detection and classification

Active Publication Date: 2022-06-28
杭州鸿源智网检测技术有限公司
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the difficulty in obtaining a large number of labeled samples, limited labeled samples can only feed back limited information, and existing machine learning models seldom consider the timing characteristics of learning abnormal behaviors such as synchronization and correlation in network connections. Difficult to meet the growing requirements of high detection rate and low false alarm rate

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An Intelligent Analysis Method of Malicious Files Based on Generative Adversarial Networks
  • An Intelligent Analysis Method of Malicious Files Based on Generative Adversarial Networks
  • An Intelligent Analysis Method of Malicious Files Based on Generative Adversarial Networks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application. Obviously, the described embodiments are only a part of the embodiments of the present application, but not all of the embodiments. Based on the embodiments in the present application, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present application.

[0032] Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the technical field to which this application belongs. The terms used herein in the specification of the present application are for the purpose of describing specific embodiments only, and are not intended to limit the present application.

[0033]In one of the embodiments, a method for...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a malicious file intelligent analysis method based on a generative confrontation network, based on a basic application data set, using the idea of ​​generative confrontation network confrontation interactive training, continuously generating samples by the generative model, expanding the label sample set, and improving intrusion The detection model detection classification improves the detection accuracy of intrusion behavior, can enhance the detection ability of the model to perform multi-classification tasks, and provides an effective method for improving the generalization ability of the intrusion detection model. Moreover, the intelligent malicious code detection method based on API behavior characteristics can better detect unknown malicious codes that behave similarly to known malicious code samples, without being affected by technologies such as polymorphism, code obfuscation, encryption and packing of malicious codes, Therefore, the present application has the advantages of high detection rate and low false alarm rate.

Description

technical field [0001] The present application belongs to the field of information security, and in particular relates to an intelligent analysis method for malicious files based on generative adversarial networks. Background technique [0002] With the escalation of network offensive and defensive warfare, network attacks have gradually developed from simple means to complex three-dimensional attacks represented by advanced network attacks. At present, most of the detection of advanced network attacks in the market is still at the traditional level, which is mainly divided into the following four categories: network traffic analysis, software static feature detection, dynamic sandbox detection and hook technology. Among them, network traffic analysis uses traffic to judge suspicious behavior, while software static feature detection, dynamic sandbox detection and hook technology are often used to detect malicious files and malicious programs (such as RAT). [0003] Among th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/56G06K9/62
CPCG06F21/562G06F18/214G06F18/2411
Inventor 朱添田李曜晟
Owner 杭州鸿源智网检测技术有限公司