Supercharge Your Innovation With Domain-Expert AI Agents!

Benign file list generation

A file list, benign technology, applied in the direction of platform integrity maintenance, user identity/authority verification, instruments, etc., can solve problems such as increase

Inactive Publication Date: 2021-08-20
BEIJING DIDI INFINITY TECH & DEV
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When using a single-stage approach, these two goals are at odds with each other, since adjusting the detection to increase one ratio causes the other to also increase

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Benign file list generation
  • Benign file list generation
  • Benign file list generation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] Specific non-limiting embodiments of the invention will now be described with reference to the accompanying drawings. It should be understood that specific features and aspects of any embodiment disclosed herein can be used and / or combined with specific features and aspects of any other embodiment disclosed herein. It should also be understood that these embodiments are exemplary, and merely describe a small number of embodiments within the scope of the invention. Various changes and modifications involved in the present invention, which are obvious to those skilled in the art, are deemed to be within the spirit, scope and intent of the present invention as further defined in the appended claims.

[0025] The methods disclosed herein improve the functionality of computing systems that generate or use lists of benign files. Three common approaches to malware detection are signature-based, behavior-based, and machine learning-based methods. Signature-based methods have ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Exception lists may be generated by combing a standard list and a client list. Standard benign file information identifying a set of standard benign files may be obtained. A set of standard signatures for the set of standard benign files may be obtained. Client benign file information identifying a set of client benign files for a client may be obtained. A set of client signatures for the set of client benign files for the client may be obtained. A client exception list for the client may be generated based on the set of standard signatures and the set of client signatures.

Description

[0001] related application [0002] This application claims the benefit of priority to U.S. Nonprovisional Application No. 16 / 221,799, entitled "Benign File List Generation," filed December 17, 2018, the contents of which are incorporated by reference Incorporated herein in its entirety. technical field [0003] The present disclosure generally relates to generating a list of benign files. Background technique [0004] Two goals of malware detection software are to have a high detection rate for actual malware and to have a low false positive rate. False positives occur when a benign file is considered malware. Malware detection is usually done using a single stage approach. When using a single-stage approach, these two goals are at odds with each other, because adjusting detection to increase one rate causes the other rate to increase as well. By using a hybrid two-stage approach, the false positive rate can be reduced while maintaining the actual detection rate. Con...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56H04L9/32
CPCG06F21/51G06F21/565G06F21/50G06F21/55G06F21/57G06F21/577G06F2221/034
Inventor 任力伟王巧月
Owner BEIJING DIDI INFINITY TECH & DEV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More