Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method, system, and computer-readable storage medium for detecting a Trojan horse image

A detection method and picture technology, applied in computer parts, computer security devices, computing, etc., can solve the problems of great difficulty, limited image classification accuracy, and disordered text, and achieve the effect of comprehensive feature dimensions and improved detection accuracy.

Active Publication Date: 2022-02-25
ZHEJIANG PONSHINE INFORMATION TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The text after the normal decoding of the picture is messy, and the codes of the Trojan horse program are various, so it is very difficult to identify. In the existing technology, feature identification is only performed on time series features, which easily leads to limited accuracy of image classification.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, system, and computer-readable storage medium for detecting a Trojan horse image
  • Method, system, and computer-readable storage medium for detecting a Trojan horse image
  • Method, system, and computer-readable storage medium for detecting a Trojan horse image

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] In order to illustrate the embodiments of the present invention more clearly, the specific implementation manners of the present invention will be described below with reference to the accompanying drawings. Obviously, the accompanying drawings in the following description are only some embodiments of the present invention, and those skilled in the art can obtain other accompanying drawings based on these drawings and obtain other implementations.

[0052] Such as figure 1 and figure 2 As shown, the Trojan horse picture detection method of the embodiment of the present invention comprises the following steps:

[0053] S1. Data collection, creating an image data set, decoding and segmenting pictures in the image data set;

[0054] Among them, the image data set includes normal pictures, Windows Trojan pictures, linux Trojan pictures and webpage Trojan pictures.

[0055] Specifically, after each picture is decoded, each K character segmentation as a text sample, ins...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to a Trojan horse picture detection method, system and computer-readable storage medium; the Trojan horse picture detection method includes: S1, decoding and segmenting pictures in an image data set; wherein, the image data set includes normal pictures and Trojan horse pictures; S2. Construct the overall features of the text based on the text samples obtained by segmentation; S3. Extract the features of the text vector through the two-way LSTM with attention and three parallel CNNs with different kernel_sizes, and obtain the LSTM features and CNN features; S4. Combine the three After that, through the fully connected layer and softmax activation function, a hybrid neural network model is established and weight training is performed; S5, the picture to be detected is decoded, segmented, and then processed to obtain three types of features and input weight training. The hybrid neural network model outputs the classification result of the picture to be detected. The invention improves the precision of Trojan horse detection.

Description

technical field [0001] The invention belongs to the technical field of Trojan horse detection, and in particular relates to a Trojan horse picture detection method, system and computer-readable storage medium. Background technique [0002] A large number of images are added to the Internet every year, but some images look normal, but actually hide Trojan horse codes. Using neural networks, Trojan horse images can be decoded, detected and classified to purify the network environment and ensure the healthy development of the Internet. [0003] In the prior art, the patent document with the publication number CN111723368A discloses a malicious code detection method based on Bi-LSTM and self-attention, which converts the malicious code into a sequence of byte streams of uniform length, and each byte element utilizes multi-dimensional One-hot encoding representation; the bidirectional long short-term memory Bi-LSTM model is used to automatically learn the sequence characteristics...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/56G06K9/62G06V10/764G06V10/80G06V10/82G06F16/35G06N3/04
CPCG06F21/562G06F16/353G06N3/047G06N3/048G06N3/044G06N3/045G06F18/2415G06F18/253
Inventor 林建洪陈晓莉赵祥廷郝辰亮朱崇章亮
Owner ZHEJIANG PONSHINE INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products