Risk application detection method and device and server

A technology for risk and target applications, applied in computer security devices, instruments, character and pattern recognition, etc., can solve problems such as no solution, inability to accurately detect and identify risk applications, and missed detection, to reduce detection errors, The effect of protecting data security and improving detection accuracy

Pending Publication Date: 2021-07-09
INDUSTRIAL AND COMMERCIAL BANK OF CHINA
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

As a result, the above-mentioned risky applications cannot be accurately detected and identified based on existing methods, resulting in missed detection
[0004] For the above problems, no effective solution has been proposed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Risk application detection method and device and server
  • Risk application detection method and device and server
  • Risk application detection method and device and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0062] In order to enable those skilled in the art to better understand the technical solutions in this specification, the technical solutions in the embodiments of this specification will be clearly and completely described below in conjunction with the drawings in the embodiments of this specification. Obviously, the described The embodiments are only some of the embodiments in this specification, not all of them. Based on the embodiments in this specification, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the protection scope of this specification.

[0063] The embodiment of this specification provides a method for detecting a risk application, and the method for detecting a risk application may be specifically applied to a system including a server and a detection terminal. Specifically, see figure 1 shown. The server and the detection terminal can be connected in a wired or wireless manner for specific ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a risk application detection method and device and a server. Based on the method, before specific implementation, a positive sample path set and a negative sample path set can be used for training a corresponding preset first path processing model, a preset second path processing model and a preset classification model; during specific implementation, a target application can be subjected to preset static analysis firstly, and a key API based on the target application and a plurality of API calling paths related to the key API are determined; then, the preset first path processing model and the preset second path processing model are called for processing the API calling paths to obtain and utilize suspicious degree parameters of the API calling paths and construct a suspicious degree feature vector about the target application; and a preset classification model is called to process the suspicious degree feature vector, and determine whether the target application is a risk application. Therefore, the risk application injected with a small number of malicious codes can be accurately and efficiently detected and identified.

Description

technical field [0001] This specification belongs to the field of artificial intelligence technology, and in particular relates to detection methods, devices and servers for risky applications. Background technique [0002] When detecting risky applications (for example, malicious Android software, etc.), most of the existing methods start from the perspective of the application as a whole and perform feature extraction on the overall code of the application to determine whether the application is a risky application. [0003] However, in order to avoid being detected and identified, some risky applications will inject a small amount of malicious code into the application code, and use the overall characteristics of most of the normal code in the application to hide the partial characteristics of a small part of the malicious code. As a result, the above risk applications cannot be accurately detected and identified based on existing methods, and missed detection occurs. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/56G06K9/62
CPCG06F21/563G06F18/24G06F18/295G06F18/214
Inventor 黄思创林欢哲俞丽萍田晓燕
Owner INDUSTRIAL AND COMMERCIAL BANK OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products