Security process identification method and system based on machine instruction structure
A technology of process identification and machine instructions, applied in instruction analysis, neural learning methods, machine execution devices, etc., can solve problems such as lack of generalization ability, failure to operate normally, increase the difficulty and danger of system management, and achieve feature generalization strong ability, improve recognition accuracy, and improve the effect of recognition ability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0056] A security process identification method based on machine instruction structure, see figure 1 , including the following steps:
[0057] S1: Train all executable files on the preset whitelist to build a feature vector classifier;
[0058] S2: Obtain the executable file to be identified;
[0059] S3: Compare the executable file to be identified with the feature vector classifier, and determine whether the executable file to be identified is an executable file on the white list according to the comparison result.
[0060]Specifically, all executable files on the whitelist are considered safe files. For example, the computer systems of enterprises or government agencies have high security requirements, and generally only run certified executable files, so such computer systems must have executable file comparison technology with high accuracy and strong generalization ability as basic. However, the traditional byte-level comparison is very easy to change and is not suit...
Embodiment 2
[0087] A secure process identification system based on machine instruction structure, see figure 2 ,include:
[0088] Training unit: used to train all executable files on the preset whitelist to build a feature vector classifier;
[0089] Identification unit: used to obtain the executable file to be identified; compare the executable file to be identified with the feature vector classifier, and determine whether the executable file to be identified is an executable file on the white list according to the comparison result.
[0090] Preferably, the training unit is specifically used for:
[0091] Disassemble executable files on the preset whitelist into advanced instruction sets;
[0092] Divide the advanced instruction set into blocks to obtain multiple basic execution blocks, and each basic execution block is provided with a sequence block code;
[0093] Encode each sequence block as a feature vector to build a feature library;
[0094] An artificial neural network is co...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

