Unlock instant, AI-driven research and patent intelligence for your innovation.

Malicious code detection method and system based on recurrent neural network

A malicious code detection and cyclic neural network technology, applied in the field of network security, can solve the problems of large errors, poor transferability, waste of manpower and material resources, etc., and achieve the effect of strengthening detection capabilities, improving accuracy, and reducing manual operations

Pending Publication Date: 2021-08-10
WUHAN UNIV OF SCI & TECH
View PDF12 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, traditional machine learning often requires manual adjustment of the rule set. The error is large and the transferability is poor, and a lot of manpower and material resources are wasted.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious code detection method and system based on recurrent neural network
  • Malicious code detection method and system based on recurrent neural network
  • Malicious code detection method and system based on recurrent neural network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The principles and features of the present invention are described below in conjunction with the accompanying drawings, and the examples given are only used to explain the present invention, and are not intended to limit the scope of the present invention.

[0040] Such as figure 1 As shown, the present invention provides a malicious code detection method based on a cyclic neural network, comprising the following steps of obtaining the target code to be detected, and preprocessing the target code to obtain the target code operation code sequence; The code operation code sequence is vectorized to obtain the word vector of the target code; the word vector of the target code is input into the pre-trained LSTM malicious code detection model for detection, and the malicious code in the target code is obtained .

[0041] The invention detects the Webshell by using a convolutional neural network of deep learning, and uses a word vector conversion algorithm word2vec to convert...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a malicious code detection method and system based on a recurrent neural network, and the method comprises the steps: obtaining a to-be-detected target code, carrying out the preprocessing of the target code, and obtaining a target code operation code sequence; performing vectorization processing on the operation code sequence of the target code to correspondingly obtain a word vector of the target code; and inputting the word vector of the target code into a pre-trained LSTM malicious code detection model for target detection, and detecting whether a malicious code exists in the target code or not. Compared with the traditional machine learning algorithm, the method has the advantages that the accuracy is effectively improved, the loss rate is reduced, the manual operation is reduced, and the detection capability of unknown Webshell is also effectively enhanced.

Description

technical field [0001] The invention relates to the field of network security, in particular to a malicious code detection method and system based on a cyclic neural network. Background technique [0002] Webshell is a web page backdoor program, also known as a Trojan horse, and is a web management tool that can operate web servers. Hackers often use various loopholes to upload their own written Webshell to the Web server to manage files, databases, etc. Hackers can perform a series of malicious operations such as uploading and downloading files, invoking related system commands, etc. on the website embedded in the Webshell, and what's more, they can bypass WAF through various obfuscation methods. Webshells are extremely stealthy and difficult to detect, and their variety has been greatly expanded over time. According to the type of script, it can be divided into PHP Trojan, ASP Trojan, JSP Trojan and CGI Trojan; according to its function, it can be divided into big horse,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56G06N3/04G06N3/08
CPCG06F21/563G06N3/08G06F2221/033G06N3/044G06N3/045
Inventor 周子恒赵叙
Owner WUHAN UNIV OF SCI & TECH