Malicious software detection system

A malware detection system technology, applied in biological neural network models, instruments, platform integrity maintenance, etc.

Pending Publication Date: 2021-09-28
北京卫达信息技术有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, machine learning-based malware detection techniques are still limit

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious software detection system
  • Malicious software detection system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] Specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings, so that those skilled in the art can easily implement the present invention.

[0023] like figure 1 As shown, the malware detection system of the present application includes a metadata extraction module 1 , a data converter 2 , a resizing module 3 , a data enhancement module 4 , a neural network module 5 and a visualization module 6 .

[0024] Metadata extraction module 1 can receive malware binary data as training data and extract metadata. Malware metadata could be strings, DLL and API calls, byte-n-grams, Opcode-n-grams, PE header fields, network and host activity, image properties, hardware characteristics, and similar. In the case of mobile computing, malware metadata can be permissions and intents, strings, system calls, image attributes, network and host activity, etc.

[0025] The data converter 2 may convert the extracted metadata in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a malicious software detection system, which comprises a metadata extraction module for receiving malicious software binary data as training data and extracting metadata; the data converter is used for extracting metadata from input malicious software binary data and converting the extracted metadata into image data, and the data converter comprises a first image generator, an audio file generator and a second image generator; the size adjusting module is used for adjusting the image data converted by the first image generator and the second image generator to a preset size suitable for training the neural network module; a data enhancement module that performs data enhancement on the image data converted by the first image generator and the second image generator; a neural network module receiving the image data enhanced by the data enhancement module to learn malware; and the visualization module is used for calculating the characteristics of the binary data of the malicious software extracted by the trained neural network module by using a t-SNE algorithm and visualizing two-dimensional and three-dimensional t-SNE graphs. According to the system, the result of the detection algorithm technology can be visually displayed and is convenient to read. The invention further provides a detection method of the malicious software detection system.

Description

technical field [0001] The present invention relates to a malware detection system, more specifically, it converts malware binary data into image data by applying image technology, and then applies image recognition based on deep learning to classify the image data. Background technique [0002] In recent years, with the increasing scale and diversity of mobile network malware, it has brought considerable threats to users' property and personal privacy. According to the research on the malicious behavior of various malware, the existing mobile malware detection methods are divided into three categories, which are static detection based on malicious code, dynamic detection based on system malicious call, and traffic detection based on network behavior. Static detection based on malicious code extracts static code features from the decompiled apk file and matches them with the feature library; dynamic detection based on malicious system calls runs applications and uses stains ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/55G06F21/56G06N3/04G06N3/08
CPCG06F21/563G06F21/554G06N3/08G06N3/045
Inventor 张长河
Owner 北京卫达信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products