Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Classification method for malicious code based on A_Kohonen neural network

A malicious code and neural network technology, applied in the field of computer network security, achieves simple algorithms, improved classification accuracy, and good real-time performance

Inactive Publication Date: 2014-03-26
NANJING UNIV OF POSTS & TELECOMM
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there is no relevant public literature at home and abroad to show that there is research in this area

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Classification method for malicious code based on A_Kohonen neural network
  • Classification method for malicious code based on A_Kohonen neural network
  • Classification method for malicious code based on A_Kohonen neural network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The technical scheme of the present invention is described in detail below in conjunction with accompanying drawing:

[0033] The idea of ​​the invention is to introduce the artificial neural network into the classification of malicious codes, and use the self-learning ability of the artificial neural network to automatically classify unknown malicious codes.

[0034] The artificial neural network is a system that can learn and summarize, that is to say, it can learn and summarize through the experimental application of known data. The artificial neural network can reason and generate a system that can be automatically recognized through the comparison of local situations (and these comparisons are determined based on automatic learning in different situations and the complexity of the actual problem to be solved). Different from the learning methods based on the symbol system, they also have reasoning functions, but they are based on logical calculation algorithms, tha...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a classification method for a malicious code based on an A_Kohonen neural network, belonging to the technical field of computer network security. According to the invention, an artificial neural network is introduced into the classification of the malicious code for the first time, and the existing unsupervised learning Kohonen neural network is improved. After the unsupervised learning in the first stage, a supervised learning process is added, so that the classification precision is improved. By the method, the fast and precision classification for an unknown malicious code becomes possible, and the algorithm is simple and real-time.

Description

technical field [0001] The invention relates to a malicious code classification method, in particular to a malicious code classification method based on the A_Kohonen neural network improved by the Kohonen neural network, and belongs to the technical field of computer network security. Background technique [0002] Malicious codes are a group of programs that infect other software by replicating themselves, including traditional computer viruses, network worms, and Trojan horses. With the development of technology, the types and quantities of malicious codes are in an explosive development trend. There is a certain lag in the response of traditional anti-virus software systems to the continuous emergence of malicious codes. In order to make up for this defect and respond to various malicious codes appearing on the Internet as soon as possible, Rising, Trend Micro, Kaspersky, McAFee, Symantec, Jiangmin Technology, PANDA, Kingsoft, 360, etc. have launched their own cloud secu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06N3/02G06F21/56
Inventor 徐小龙熊婧夷杨庚孙燕飞陈丹伟曹嘉伦张义龙邹勤文曹玲玲周静岚
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products