Virus type identification method and device
A type identification and virus technology, applied in the field of information security, can solve the problems of virus identification false positives, feature failures, false positives, etc., to achieve the effect of avoiding false positives and false negatives, good identification, and solving false positives and false positives
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0020] According to an embodiment of the present application, an embodiment of a method for identifying a virus type is also provided. It should be noted that the steps shown in the flow chart of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, Also, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.
[0021] The method embodiment provided in Embodiment 1 of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. Take running on a computer terminal as an example, figure 1 It is a block diagram of the hardware structure of a computer terminal of a virus type identification method in the embodiment of the present application. Such as figure 1 As shown, the computer terminal 10 may include one or more (only one is shown in the figure) pro...
Embodiment 2
[0089] According to an embodiment of the present invention, a device for implementing the above virus type identification method is also provided, Figure 6 is the structural frame of the virus type identification device according to the embodiment of the present application Figure 1 ,Such as Figure 6 As shown, the device includes:
[0090] The first preprocessing module 62 is used to preprocess the behavior data to be tested of the virus to obtain word frequency vectors;
[0091] It should be noted that the virus may be a Trojan horse virus or a worm virus, but is not limited thereto.
[0092] The above-mentioned preprocessing process can be completed by an independent module (such as the first preprocessing module 62), and can also be completed by a plurality of submodules or units contained in the module. For the latter, the first preprocessing module 62 can only include The word segmentation unit is used to perform word segmentation processing on the behavior data to ...
Embodiment 3
[0116] Embodiments of the present invention may provide a computer terminal, and the computer terminal may be any computer terminal device in a group of computer terminals. Optionally, in this embodiment, the foregoing computer terminal may also be replaced with a terminal device such as a mobile terminal.
[0117] Optionally, in this embodiment, the foregoing computer terminal may be located in at least one network device among multiple network devices of the computer network.
[0118] In this embodiment, the above-mentioned computer terminal can execute the program code of the following steps in the virus type identification method of the application program: preprocessing the behavior data of the virus to be tested to obtain the word frequency vector; obtaining the word frequency vector and each classification of the virus The distance between the cluster center points is obtained by obtaining multiple distance values; the classification of the cluster center point correspo...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com