Malware sequence detection

A malware and sequence detection technology, applied to instruments, biological neural network models, calculations, etc., can solve problems such as discontinuous event sequences, production level problems, and difficult detection

Active Publication Date: 2020-09-11
MICROSOFT TECH LICENSING LLC
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Malware (enabling software to perform a series of actions with negative intent) can cause serious production-level problems
Furthermore, the sequence of events of malware may be discontinuous throughout the sequence of operations and thus not easily detected

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malware sequence detection
  • Malware sequence detection
  • Malware sequence detection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] Malware (or malicious software) is an ongoing and growing problem in computer security. Malware is an act that enables software to perform a series of actions with negative intent, potentially causing serious production-level problems. As used herein, the term "malware" includes malicious files, processes, programs, instructions, data and / or software designed to damage, destroy or disable computers and computer systems, or to cause damage to computer users or computer user data. By embedding certain code snippets in regular software, it can successfully run the desired command without being detected by antivirus software. However, since certain commands must be run in a certain order relative to the malware's functionality, or in combination with some other sequence of malware instructions, for the malware to be effective, if the software can be executed in a secure environment and Malicious behavior can be detected during emulation and can be defended against. Howeve...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Implementations described herein disclose a malware sequence detection system for detecting presence of malware in a plurality of events. An implementation of the malware sequence detection includes receiving a sequence of a plurality of events, and detecting presence of a sequence of malware commands within the sequence of a plurality of events by dividing the sequence of plurality of events intoa plurality of subsequences, performing sequential subsequence learning on one or more of the plurality of subsequences, and generating a probability of one or more of the plurality of subsequences being a malware based on the output of the sequential subsequence.

Description

Background technique [0001] The reach and scale of the internet has facilitated a parasitic industry of those seeking to profit illegally and / or unethically. A common strategy for illegal profit-making is to infect a user's computer with malicious code or software (malware) that can be used to obtain passwords, send spam, obtain contact lists, join botnets, and more. Malware is an ongoing and growing problem in computer security. Malware typically exploits code vulnerabilities and / or installs it on a user's computer system by inducing the user to take some action. Malware (enabling software to perform a series of actions with negative intent) can cause serious production-level problems. Furthermore, the sequence of events of malware may be discontinuous throughout the sequence of operations and thus not easy to detect. Similarly, a malware's sequence of events may be realized by multiple processes running independently of each other. Contents of the invention [0002] Em...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56
CPCG06F21/56G06F21/566G06N3/08G06N3/045G06N3/047
Inventor R·阿格拉瓦尔J·W·斯托克斯三世K·塞尔瓦拉杰A·M·马里内斯库
Owner MICROSOFT TECH LICENSING LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products