Malicious code detection method for safety protection of power enterprise

A malicious code detection and security protection technology, applied in neural learning methods, computer security devices, platform integrity maintenance, etc., can solve problems such as weak protection capabilities, and achieve the effect of improving efficiency

Pending Publication Date: 2022-02-25
CENT CHINA BRANCH OF CHINA DATANG CORP SCI & TECH RES INST CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] In view of the above situation, in order to overcome the deficiencies in the prior art, the purpose of the present invention is to provide a malicious code detection method for the security protection of electric power enterprises, which can effectively improve the malicious code detection method of electric power enterprises for the weak protection ability of electric power enterprise security protection. Efficiency and accuracy of code detection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious code detection method for safety protection of power enterprise
  • Malicious code detection method for safety protection of power enterprise
  • Malicious code detection method for safety protection of power enterprise

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The present invention will be described in further detail in conjunction with the specific implementation of the accompanying drawings.

[0035] Such as figure 1As shown, aiming at the problem of weak protection ability of power enterprise security protection, the present invention proposes a malicious code detection method suitable for enterprise security protection, analyzes the instruction set generated by the system program, and according to the characteristics of the data and the instruction set, Use the taint propagation analysis algorithm to taint the instruction set, build a behavior dependency graph, enhance the constructed behavior dependency graph, construct positive and negative samples, and generate enough samples by comparing and learning the positive and negative sample data. Then the newly generated sample data and the original data set are combined to form an enhanced data set; then a differentiable classification algorithm is used to estimate the proba...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a malicious code detection method for safety protection of a power enterprise, which comprises the steps of sampling an original data set by an instruction set generated by a system program, extracting malicious features by analyzing the content of samples and the relationship between the samples according to the features of the instruction set in the data set, performing taint marking on the instruction set by using a taint propagation analysis algorithm, constructing a behavior dependency graph, performing enhancement processing on the behavior dependency graph, constructing positive and negative example samples, performing comparative learning according to the obtained positive and negative sample data to generate enough samples, then forming an enhanced data set by using newly generated sample data and the original data set, inputting the enhanced data set into a comparative learning feature extractor taking the neural network as an encoder to learn representation features of the malicious codes, finally performing parameter adjustment and optimization on a loss function of the neural network through a back propagation algorithm, and storing a trained optimal model to detect and identify the malicious codes.

Description

technical field [0001] The invention belongs to the technical field of network security, in particular to a malicious code detection method used for security protection of electric power enterprises. Background technique [0002] With the improvement of the automation level of the power system, the enrichment of functions, the extension of the coverage of the dispatching data network, and the increase of users, the threats to the information security of the power system are becoming more and more diversified. Medium and high-risk vulnerabilities, medium-risk vulnerabilities, and low-risk vulnerabilities in the power industry accounted for 21%, 55%, and 24% respectively. Attackers can use high-risk vulnerabilities to obtain the control authority of the power industrial control terminal, arbitrarily modify the status of switches and other components, interrupt and interfere with normal power supply services, and use the industrial control terminal as a springboard to launch at...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56G06N3/04G06N3/08
CPCG06F21/577G06F21/566G06N3/08G06N3/045
Inventor 王方玉张之刚李若峰付卫宁
Owner CENT CHINA BRANCH OF CHINA DATANG CORP SCI & TECH RES INST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products