Malware detector training method, detector, electronic equipment and storage medium
A technology of malware and training methods, applied in the fields of instruments, electrical components, electrical digital data processing, etc., can solve the problem of high difficulty in model training, and achieve the effect of reducing labor costs, ensuring accuracy, and reducing difficulty
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0027] figure 1 Embodiment 1 of the present invention provides a flowchart of a malware detector training method, such as figure 1 As shown, the method includes:
[0028] S110. Obtain an original sample data set, and obtain an original malware detection rate of the original sample data set.
[0029] Specifically, the original sample data set includes multiple original samples. When the original sample data set is obtained, the type of the original sample (malware or benign software) can be known at the same time, that is to say, the original sample data set can be known at this time. The specific number of malware; input the original sample into the feature set training classifier, and then the probability of each sample being classified as malware or benign software can be obtained (for example, the probability of a sample being malware is 0.6, and the probability of benign software is 0.6). 0.4, the sample is determined to be malware); assuming that the specific number of ...
Embodiment 2
[0043] figure 2 This is a flowchart of a malware detector training method provided in Embodiment 2 of the present invention. This embodiment is an example of the previous embodiment, and specifically describes how to ensure the difference between the malware detection rate and the original malware detection rate. The value is within the first preset range.
[0044] Specifically, as figure 2 As shown, the method includes:
[0045] S210. Obtain an original sample data set, and obtain an original malware detection rate of the original sample data set.
[0046] S220. Acquire characteristic parameters of each original sample.
[0047] S230 , according to the characteristic parameters, select a representative sample data set whose proportion of the total samples is α from the original sample data set, and obtain the malware detection rate of the representative sample data set.
[0048] S240: Determine whether the difference between the malware detection rate and the original m...
Embodiment 3
[0055] image 3 This is a flowchart of a malware detector training method provided in Embodiment 3 of the present invention. This embodiment is an example of the foregoing embodiments, and specifically describes how to obtain a malware detector.
[0056] Specifically, as image 3 As shown, the method includes:
[0057] S310. Obtain an original sample data set, and obtain an original malware detection rate of the original sample data set.
[0058] S320. Acquire characteristic parameters of each original sample.
[0059] S330 , according to the characteristic parameters, select a representative sample data set whose proportion of the total samples is α from the original sample data set, and obtain the malware detection rate of the representative sample data set.
[0060] S340. Input the representative sample data set into the detection model based on the AdaBoost algorithm, and extract the initial detection rule.
[0061] Specifically, in this embodiment, the detection model...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


