Malicious code classification method and device, electronic equipment and medium

A malicious code and classification method technology, which is applied in the field of electronic equipment and storage media, devices, and malicious code classification methods, and can solve the problems of poor identification of the family of malicious codes, etc.

Pending Publication Date: 2022-07-12
CHINA TELECOM CORP LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present disclosure is to provide a malicious code classification method, device, storage medium and electronic equipment, at least to a certain extent, to overcome the problem of poor identification of the family of malicious codes in the related art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious code classification method and device, electronic equipment and medium
  • Malicious code classification method and device, electronic equipment and medium
  • Malicious code classification method and device, electronic equipment and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments, however, can be embodied in various forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of example embodiments to those skilled in the art. The described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments.

[0032] Furthermore, the drawings are merely schematic illustrations of the present disclosure and are not necessarily drawn to scale. The same reference numerals in the drawings denote the same or similar parts, and thus their repeated descriptions will be omitted. Some of the block diagrams shown in the figures are functional entities that do not necessarily necessarily correspond to physically or logically separate entities. These functi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a malicious code classification method and device, electronic equipment and a medium, and relates to the technical field of network and information security. The malicious code classification method comprises the following steps: performing visualization processing on a pre-classified malicious code file to obtain a pre-classified malicious code image; inputting the malicious code image into a convolutional neural network model, and processing the malicious code image into a classification feature vector with a uniform size based on a spatial pyramid pooling layer of the convolutional neural network model; and carrying out model iteration training on the convolutional neural network model based on the classification feature vector so as to obtain a classification model of the malicious code image based on the model iteration training. According to the technical scheme, by means of the characteristic that the image features of the malicious codes of the same family have similarity, the spatial pyramid pooling is introduced, and the reliability of performing family recognition on the malicious code file through the obtained family classification model can be guaranteed.

Description

technical field [0001] The present disclosure relates to the technical field of network and information security, and in particular, to a malicious code classification method, device, electronic device and storage medium. Background technique [0002] Due to the influence of external factors, many companies have set up a remote office mode. The popularity of the remote office mode has gradually increased the number and frequency of network transmission of electronic documents, and the widespread use of electronic documents has created environmental conditions for the spread of malicious codes. , the types and bad effects of malicious code are also gradually increasing. [0003] Because malicious code is usually iterated by a malicious code team based on a certain malicious code, for example, the author of the malicious code confuses the characteristics of the existing malicious code through technical means such as deformation, packing, and polymorphism, thereby generating ne...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/56G06N3/04G06N3/08
CPCG06F21/561G06N3/08G06N3/045
Inventor 董浩段赟刘东鑫汪来富
Owner CHINA TELECOM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products