Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Malicious software detection method and device

A technology of malware and detection methods, applied in neural learning methods, computer security devices, computer parts, etc., to avoid human influence and improve detection efficiency and accuracy

Pending Publication Date: 2021-09-21
HANGZHOU DPTECH TECH
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, it is a good choice to make some attempts to replace artificial intelligence with artificial intelligence in the field of information security where there are relatively few artificial intelligence applications.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious software detection method and device
  • Malicious software detection method and device
  • Malicious software detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of example embodiments to those skilled in the art. The same reference numerals denote the same or similar parts in the drawings, and thus their repeated descriptions will be omitted.

[0033] Furthermore, the described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided in order to give a thorough understanding of embodiments of the present disclosure. However, those skilled in the art will appreciate that the technical solutions of the present disclosure may be practiced without one or mo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a malicious software detection method and device, electronic equipment and a computer readable medium. The method comprises the following steps: obtaining target software to be detected; converting the target software into at least one grayscale image; inputting the at least one gray level image into a malicious software recognition model, generating at least one malicious software probability, wherein the malicious software recognition model is generated through training of a convolutional neural network model; when the at least one malicious software probability meets a preset strategy, determining that the target software is malicious software. According to the malicious software detection method and device, the electronic equipment and the computer readable medium, the knowledge reserve requirement for personnel during malicious software detection can be reduced, human influence is avoided, malicious software is automatically detected, and the detection efficiency and accuracy are improved.

Description

technical field [0001] The present disclosure relates to the field of computer information processing, in particular, to a malware detection method, device, electronic equipment, and computer-readable medium. Background technique [0002] Today, with the rapid application and popularization of artificial intelligence, most of the accurate judgment of whether a new software is malware still requires manual reverse engineering. Traditional reverse engineering is mainly divided into static and dynamic. Static analysis mainly uses tools to collect software information, research software structure and sensitive strings. Dynamic analysis mainly involves running the software under test using a virtual environment to infer or confirm the behavior of the software under test through observation, tracing. In an environment where learning programming is advocated and more and more people know how to program, new software emerges in an endless stream. At the same time, with the high p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/56G06K9/62G06N3/04G06N3/08
CPCG06F21/562G06N3/08G06N3/045G06F18/2414G06F18/2415
Inventor 曹晨煜
Owner HANGZHOU DPTECH TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products