Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Malicious file detection method and device, computer equipment and storage medium

A technology for malicious files and detection methods, applied in the information field, can solve the problems affecting the detection efficiency of malicious files, long malicious file detection cycle, long model training time, etc., to shorten the entire cycle, reduce the calculation pressure, and simplify the detection process.

Pending Publication Date: 2021-11-26
SHANGHAI GUAN AN INFORMATION TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, machine learning or deep learning methods need to build a detection model in advance. In order to ensure the detection accuracy of the model, a large number of sample features need to be constructed for training. The entire detection cycle of malicious files is long, which affects the detection efficiency of malicious files

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious file detection method and device, computer equipment and storage medium
  • Malicious file detection method and device, computer equipment and storage medium
  • Malicious file detection method and device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] Hereinafter, the present invention will be described in detail with reference to the drawings and examples. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other.

[0037] Currently, machine learning or deep learning is usually used to detect malicious files. However, machine learning or deep learning methods need to build a detection model in advance. In order to ensure the detection accuracy of the model, a large number of sample features need to be constructed for training. The entire detection cycle of malicious files is longer, which affects the detection efficiency of malicious files.

[0038] In order to solve the above problems, the embodiment of the present invention provides a detection method of malicious files, such as figure 1 As shown, the method includes:

[0039] 101. Acquire a call interface sequence corresponding to the file to be detected. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a malicious file detection method and device, computer equipment and a storage medium, relates to the technical field of information, and mainly aims at relieving the calculation pressure of malicious file detection. The method comprises the steps of obtaining a calling interface sequence corresponding to a to-be-detected file; determining a feature sequence corresponding to the calling interface sequence, and determining a minimum hash signature corresponding to the to-be-detected file according to the feature sequence; according to the minimum Hash signature corresponding to the to-be-detected file, distributing the to-be-detected file to corresponding Hash buckets under different Hash intervals, wherein a plurality of Hash buckets exist in any Hash interval; determining a first target sample file which is distributed to the same hash bucket with the to-be-detected file in the different hash intervals; and judging whether the to-be-detected file is a malicious file or not according to the category information corresponding to the first target sample file. The method and the device are suitable for malicious file detection.

Description

technical field [0001] The present invention relates to the field of information technology, in particular to a malicious file detection method, device, computer equipment and storage medium. Background technique [0002] With the development of network technology and the popularization of personal computers, various Trojan horses, worms, viruses and other malicious files and their variants that endanger the normal use of users and seek illegal benefits are increasing, and there are countless new unknown malicious files. Some of these malicious files can steal personal information, passwords, documents, etc. that users have used on the device, some can hijack user devices to form a botnet, and some harass or induce user operations through various advertisements and subscription information to cause personal property losses and so on. Therefore, it is very important to effectively identify malicious files to ensure system security. [0003] Currently, machine learning or dee...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/56
CPCG06F21/562
Inventor 余贤喆梁淑云殷钱安王启凡陶景龙徐明刘胜马影周晓勇魏国富夏玉明
Owner SHANGHAI GUAN AN INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products