Visual malware detection method based on collaborative learning

A malicious software and software technology, applied in the field of cyberspace security, can solve the problems of high analysis cost, legacy idleness, and lack of marking of unmarked software samples, and achieve the effect of solving collection difficulties and reducing dependence

Active Publication Date: 2021-09-17
四川阁侯科技有限公司
View PDF13 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In traditional detection methods, before analyzing the captured malware, it is necessary to manually analyze the malware using tools such as disassembler software, virtual machines, and sandboxes. As a result, the identification of malware often lags behind the spread of software.
At the same time, in the actual detection scenario, it is very difficult to obtain marked malicious samples because the signatures of malicious samples need to undergo a lot of manual decoding and analysis.
However, a large number of unlabeled software samples cannot be used in the traditional malware detection model training process due to the lack of labels.
[0004] Traditional malware detection methods require a lot of manual decoding and analysis to achieve feature extraction and sample labeling of malicious samples
The cost of manually analyzing malicious samples is too high, making it difficult to obtain marked malicious samples, and a large number of unmarked malicious samples cannot be used in the detection model training process and are left idle

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Visual malware detection method based on collaborative learning
  • Visual malware detection method based on collaborative learning
  • Visual malware detection method based on collaborative learning

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0063] Such as figure 1 As shown, a visual malware detection method based on collaborative learning includes two processes of initialization and collaborative training. The initialization process includes: 1. Software visualization, 2. Feature extraction; the collaborative training process includes: 3. Multi-classifier Collaborative labeling of new samples, 4. Effectiveness evaluation of new labeled samples.

[0064] Next, this embodiment is described in detail:

[0065] (1) Software visualization: After obtaining the binary file of the software, first read each binary file to obtain the binary string corresponding to each file, where each character read in the binary file is expressed as 8 bits unsigned variable. Then the obtained binary strings are formed into a two-dimensional matrix; the values ​​in the two-dimensional matrix are converted into pixel values, and each pixel value is spliced ​​into a grayscale image according to the color transition from black to white. T...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a collaborative learning-based visual malware detection method, including an initialization process and a collaborative training process; wherein: the initialization process specifically includes: (1) software visualization; (2) feature extraction; the collaborative training The process specifically includes: (3) collaborative training and marking of new samples of multiple classifiers; (4) voting detection process; the present invention can use a small number of marked software sample features for modeling, and continuously optimize the detection performance of the model through a large number of unmarked samples , so that the malware detection model has the ability of self-learning and self-adaptation, thereby reducing the dependence on artificial software sample marking, and solving the difficulty of collecting marked samples in malware detection, which makes the malware classification model based on machine learning difficult to be effective training problem.

Description

technical field [0001] The invention relates to the technical field of cyberspace security, in particular to a collaborative learning-based visual malware detection method. Background technique [0002] Malware is a serious security threat facing the current cyberspace, which has the characteristics of fast generation, wide spread and strong infection ability. Malware includes Trojan horses, viruses, worms, and malicious backdoors. Since the 1990s, researchers have begun to conduct in-depth research on malware detection. Existing malware detection methods include static detection and dynamic detection methods. Currently, widely used detection methods include signature-based detection, behavior-based detection and heuristic scanning, etc. [0003] In traditional detection methods, before analyzing the captured malware, it is necessary to manually use tools such as disassembly software, virtual machines, and sandboxes to analyze the malware, resulting in the identification o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/56G06F8/53G06K9/46G06K9/62G06N20/00
CPCG06F21/562G06F8/53G06N20/00G06V10/40G06F18/214G06F18/24
Inventor 陈文黄登高覃
Owner 四川阁侯科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products