Information supervision detection method based on software function, performance and data security

A technology of data security and software function, applied in the direction of electrical digital data processing, neural learning method, computer security device, etc. Small possibility of data leakage, easy and fast processing, and the effect of improving the efficiency of information supervision

Inactive Publication Date: 2021-12-14
杭州显宏信息工程咨询有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the rapid development of Internet technology, various software spreads rapidly on the network, malware shows an exponential growth, and many variants of malicious codes also appear at the same time, which brings great harm to various network devices, and various software exists The non-running code is often mixed with a large number of subroutines and Trojan horse viruses, which poses a huge hidden danger to data security. In the era of cloud computing and big data, many companies' business operations are carried out in the network environment, and malware in network devices can pass code Missing access to data information brings huge challenges to information supervision. In view of this, how to detect software to determine network security is a technical problem that needs to be solved

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information supervision detection method based on software function, performance and data security
  • Information supervision detection method based on software function, performance and data security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0031] Example: such as Figure 1 to Figure 2 As shown, the present invention provides a method for information supervision and detection based on software functions, performance, and data security, comprising the following steps:

[0032] S1. Obtain the PE file of the target software, locate the code gaps of the unoperated software codes and unused bytes or byte segments in the PE file, and extract the code gaps;

[0033] S2. Classify and process the collected data through the preprocessing module, and extract characteristic data, and further use it as data to be detected;

[0034] S3. Input the data to be detected into the pre-trained detection model for comparative analysis one by one;

[0035] S4. Determine the security level of information data according to the comparative analysis results, classify and grade the parameters with hidden safety hazards, and feed back the software feature data and results with hidden dangers to the detection model for training and improveme...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an information supervision detection method based on software functions, performance and data security, and belongs to the technical field of information supervision, and the method comprises the following steps: obtaining a PE file of target software, positioning code gaps of unoperated software codes and unused bytes or byte segments in the PE file, and extracting the code gaps; classifying the collected data through a preprocessing module, extracting feature data, and further taking the feature data as to-be-detected data; inputting the to-be-detected data into a pre-trained detection model for one-by-one comparative analysis; judging the security level of the information data according to a comparative analysis result, classifying and grading parameters with potential safety hazards, and feeding back the software feature data with the potential safety hazards and the result to a detection model for training and improvement; and recording and storing the analyzed software name, the dangerous code position and the security defect level into a database, and displaying an analysis result.

Description

technical field [0001] The invention relates to the technical field of information supervision, in particular to an information supervision detection method based on software function, performance and data security. Background technique [0002] With the rapid development of Internet technology, various software spreads rapidly on the network, malware shows an exponential growth, and many variants of malicious codes also appear at the same time, which brings great harm to various network devices, and various software exists The non-running code is often mixed with a large number of subroutines and Trojan horse viruses, which poses a huge hidden danger to data security. In the era of cloud computing and big data, many companies' business operations are carried out in the network environment, and malware in network devices can pass code Missing data information brings huge challenges to information supervision. In view of this, how to detect software to determine network secur...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56G06K9/62G06N3/08
CPCG06F21/563G06N3/084G06F2221/033G06F18/22G06F18/214
Inventor 孙显红
Owner 杭州显宏信息工程咨询有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products