Malicious code identification method and device, computer equipment and medium

A malicious code and identification method technology, applied in computer parts, computer security devices, computing, etc., can solve the problems of inaccurate target code identification and misjudgment, and achieve a wide range of applications, low implementation costs, and reduced possibility. Effect

Pending Publication Date: 2021-04-09
PING AN TECH (SHENZHEN) CO LTD
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, due to the limitations of the existing technology, the identification of the target code is not accurate enough, and misjudgment often occurs.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious code identification method and device, computer equipment and medium
  • Malicious code identification method and device, computer equipment and medium
  • Malicious code identification method and device, computer equipment and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The malicious code identification method, device, computer equipment and media specifically provided by the present invention will be explained and illustrated in detail below in conjunction with the accompanying drawings.

[0047] Such as figure 1 shown, and can be combined with figure 2 , one or more embodiments of the present invention may provide a malicious code identification method. The identification method effectively combines the static detection method and the dynamic detection method. Specifically, the malicious code identification method includes but is not limited to at least one of the following steps.

[0048] Step 100, analyzing the target code to obtain a feature value sequence used as identification information of the target code. The object code identification information can be used to distinguish different codes or software, and can also be understood as software identification, that is, the object code can be a piece of software or a program. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of artificial intelligence, and particularly discloses a malicious code identification method and device, computer equipment and a medium. The identification method comprises the following steps: analyzing a target code to obtain a characteristic value sequence used as target code identification information; respectively matching the characteristic value sequence with a plurality of pre-stored known value sequences; identifying that the target code is a malicious code based on the condition of successful matching, and calling and executing an adversarial script corresponding to a known value sequence matched with the feature value sequence; and performing classification processing on the target code based on the matching failure condition to determine the category to which the target code belongs so as to determine whether the target code is a malicious code. According to the invention, the malicious code can be accurately and quickly identified through dual modes of static detection and dynamic detection, the network security is greatly improved, and the possibility of honeypot escape of an attacker can be remarkably reduced.

Description

technical field [0001] The invention relates to the technical field of artificial intelligence, can be applied in the field of identification of malicious codes, and specifically provides identification methods, devices, computer equipment and media of malicious codes. Background technique [0002] With the continuous development of network security technology, network security personnel have developed honeypot detection technology. By arranging some hosts, network services, etc. as baits, the attacker is induced to attack these baits, and the attack behavior can be captured and analyzed, and then the tools and methods used by the attacker can be understood, and the intention and motivation of the attacker can be speculated; Let the defender clearly understand the security threats it faces, and achieve the purpose of using technical means to enhance its own security protection capabilities. The "honeypot" used to set up decoys serves as an intelligence collection system and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55G06F21/56G06K9/62
CPCG06F21/563G06F21/55G06F18/214
Inventor 李书涵
Owner PING AN TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products