Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Image matching-based malicious code detection method

A malicious code detection and malicious code technology, which is applied in the fields of instruments, electrical digital data processing, platform integrity maintenance, etc., can solve the problems of low detection accuracy, low detection efficiency, poor robustness, etc. Accuracy, impact-reducing effect

Active Publication Date: 2017-08-25
NAT UNIV OF DEFENSE TECH
View PDF2 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] (1) Poor robustness and low detection accuracy
In this type of method, classification and detection are performed based on the features of the extracted malicious code. The detection accuracy obtained by different features may be different. The accuracy of feature extraction and the selection of features themselves will directly affect the accuracy of the final detection and analysis results. Therefore, the actual detection poor robustness and low detection accuracy;
[0006] (2) Low detection efficiency
This type of method is usually more complicated to implement, and usually takes a long time for model training, making the detection efficiency low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image matching-based malicious code detection method
  • Image matching-based malicious code detection method
  • Image matching-based malicious code detection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The present invention will be further described below in conjunction with the accompanying drawings and specific preferred embodiments, but the protection scope of the present invention is not limited thereby.

[0039] Such as figure 1 , 2 As shown, the malicious code detection method based on image matching in this embodiment, the steps include:

[0040] S1. Benchmark sample selection: Obtain training samples corresponding to different family categories of malicious code, respectively convert the training samples into grayscale images and extract corresponding image texture features; select the first benchmark sample from the training samples of each family category, and according to Selecting a second benchmark sample based on the differences in image texture features between the first benchmark sample and the samples, and forming a corresponding benchmark sample set from the first benchmark sample and the second benchmark sample selected for each family category;

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an image matching-based malicious code detection method. The method comprises the steps of S1, obtaining training samples corresponding to malicious codes of different family categories, converting the training samples into grayscale images and extracting corresponding image texture features; selecting a first reference sample from the training samples of each family category, selecting a second reference sample according to the first reference sample and the difference of the image texture features among the samples, and forming a corresponding reference sample set by the first reference sample and the second reference sample selected from each family category; S2, converting to-be-detected malicious codes into grayscale images and extracting corresponding image texture features; and S3, matching the image texture features extracted in the step S2 with the reference sample set corresponding to each family category, and confirming the family categories of the to-be-detected malicious codes according to matching results. The method has the advantages of simple realization, strong robustness, high detection accuracy and good detection effect.

Description

technical field [0001] The invention relates to the technical field of malicious code detection and analysis, in particular to a method for detecting malicious code based on image matching. Background technique [0002] With the widespread application of malicious code automatic generation tools and the application of open source code in malicious code, the number of malicious code variants and new malicious code families has also increased rapidly. According to statistics, the number of malicious code variants detected annually reached 430 million. Malicious code has become a major challenge to cyberspace security. Traditional malicious code detection methods are mainly divided into two types: one is the detection method based on the signature mechanism, which can quickly detect known malicious code samples, but the disadvantage is that it requires a lot of expert experience and manual analysis, and it is difficult to deal with deformation and obfuscated malicious code sam...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56
CPCG06F21/562
Inventor 喻波刘浏杨强解炜唐勇陈曙晖方莹
Owner NAT UNIV OF DEFENSE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products