Homologous determination method and device for the malicious files
A malicious file and judgment method technology, which is applied in the field of network security, can solve the problems of poor accuracy of the same-origin judgment results, and achieve the effect of improving accuracy, reducing calculation amount, and improving accuracy
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0029] The technical solutions in the embodiments of the present invention will be described clearly and completely in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of the present invention.
[0030] In order to solve the problem of poor accuracy of malicious file homology determination results in the prior art, in the embodiment of the present invention, each malicious file is used in four designated dimensions: process behavior, access behavior, domain name resolution behavior, and registry behavior. Under the characteristic behavior data information, determine the category to which each malicious file belongs. For each malicious file b...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com