Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Malicious behavior recognition method, system and storage medium for weighted heterogeneous graph

An identification method and heterogeneous technology, applied in the field of network security, can solve problems such as poor generalization ability, slow model update speed, and insufficient use of relational attributes, and achieve the effect of improving accuracy

Active Publication Date: 2021-09-07
GUANGZHOU UNIVERSITY
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The existing malicious behavior recognition technology based on NLP or image processing is mainly based on the self-attribute characteristics of a single sample for learning and recognition, ignoring the potential relationship between samples due to the same type or homology; although some studies have begun to use Relevant technologies in the graph field mine the feature information of these potential associations, but the graph structure they construct does not make full use of the relational properties of the graph structure, which may reduce the accuracy of malicious behavior recognition tasks; in addition, most of the existing technologies and system models belong to direct inference For new samples, it is often necessary to retrain the model parameters, which may lead to slow update speed and poor generalization ability of the model.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious behavior recognition method, system and storage medium for weighted heterogeneous graph
  • Malicious behavior recognition method, system and storage medium for weighted heterogeneous graph
  • Malicious behavior recognition method, system and storage medium for weighted heterogeneous graph

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0057] Such as figure 1 , figure 2 As shown, in the present invention, a malicious behavior recognition method for a weighted heterogeneous graph includes the following steps:

[0058] S1. Construct an inductive graph neural network model, specifically:

[0059] In this embodiment, the inductive graph neural network model includes a subgraph extraction module, a plurality of feature vector generation fusion modules, and a classification learning module; the feature vector generation fusion module includes a MalSage layer and a subgraph feature fusion layer; the The MalSage layer includes M MalConv layers, which act on M subgraphs respectively. For details, see image 3 ; The classification learning module includes a fully connected layer and a Softmax layer.

[0060] In this embodiment, the input of the inductive graph neural network model is a weighted heterogeneous graph constructed based on the malicious behavior data set, the original feature vector of the node, and mu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses a malicious behavior identification method, system and storage medium oriented to weighted heterogeneous graphs. The method includes the following steps: constructing an inductive graph neural network model, and the inductive graph neural network model includes a subgraph extraction module, Multiple feature vector generation fusion module and classification learning module; train and learn the inductive graph neural network model, extract subgraphs, learn potential vector representations of nodes in subgraphs, obtain multiple subgraph feature vectors corresponding to subgraphs, and multiple subgraphs Graph feature vector fusion, the node feature vectors obtained by fusion are classified and learned in the classification learning module; the trained inductive graph neural network model is used to identify malicious behaviors. The present invention fully combines and utilizes rich topological feature information and attribute information contained in heterogeneous graphs, and on this basis, designs an inductive learning graph neural network model to complete feature extraction and representation learning in heterogeneous graphs, and finally realize malicious behavior recognition.

Description

technical field [0001] The invention belongs to the technical field of network security, and in particular relates to a malicious behavior identification method, system and storage medium oriented to weighted heterogeneous graphs. Background technique [0002] With the rapid development of the Internet, the technology of malicious software is constantly updated and iterated. The number of malicious software is increasing day by day, and the types and transmission methods are changing day by day. The threat to personal, enterprise and national security is increasing day by day. With the continuous confrontation and upgrading of malware attack and defense technologies, malware gradually tends to be multi-variant, high-concealment, large in number, and fast-updating. Facing this network security situation, both academia and industry are constantly looking for traditional malware The combination of detection technology and machine learning aims to prevent and detect a large numb...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/56G06N3/04
CPCG06F21/562G06N3/045H04L63/1416H04L41/16
Inventor 范美华李树栋吴晓波韩伟红方滨兴田志宏殷丽华顾钊铨张倩青蒋来源秦丹一
Owner GUANGZHOU UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products