Malicious software detection method and system based on memristor neural network

A malware and neural network technology, applied in the field of information security, can solve problems such as data transmission bandwidth bottlenecks, and achieve the effect of improving generalization ability, expanding storage space, and improving recognition accuracy.

Inactive Publication Date: 2022-01-28
河南省鼎信信息安全等级测评有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The computational efficiency of neural networks depends partly on computer performance, but most current computers still have von Neumann bottlenecks, that is, after the exponential increase in memory capacity, the bottleneck of data transmission bandwidth between CPU and memory

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious software detection method and system based on memristor neural network
  • Malicious software detection method and system based on memristor neural network
  • Malicious software detection method and system based on memristor neural network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] In order to make the purpose, technical solution and advantages of the present invention more clear and understandable, the present invention will be further described in detail below in conjunction with the accompanying drawings and technical solutions.

[0026] In recent years, neuromorphic computing chips based on new electronic synaptic devices have become a research hotspot. By adjusting the current applied to the memristor, the pulse length and amplitude of the voltage, the resistance value of the memristor can be changed. Due to the mobility of ions, it is possible to simulate neural networks based on memristors. The use of memristors to construct spiking neural networks has the following advantages: (1) continuous update of synaptic weights can be achieved; (2) nanoscale memristors can realize ultra-high-density integrated networks; (3) the network has learning and memory (4) The memristor is a passive device and the non-volatility of information after power fa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of information security, and particularly relates to a malicious software detection method and system based on a memristor neural network. The method comprises the following steps: visualizing to-be-detected software into an RGB color image; carrying out normalization processing on the RGB color image, and storing the RGB color image in a memristor cross array by using a memristor; and extracting image features from the memristor by using the trained neural network model, and carrying out classification and identification. Malicious software is visualized into a color picture, and the image is stored and processed by using the memristor cross array, so that the recognition accuracy is effectively improved, and the generalization ability of the model is improved; the memristor and the lightweight convolutional neural network are combined to realize a memristor neural network solution in an embeddable device, a high-density integrated network is realized based on the memristor, a cross array structure is utilized to enhance information processing capability and expand storage space, a new solution is provided for solving the von Noiemann bottleneck problem, and malicious software detection of the Internet of Things is effectively realized.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a malware detection method and system based on a memristive neural network. Background technique [0002] With the rapid development of network technology, the era of Internet of Everything is quietly coming. At the same time that large-scale devices are connected to the Internet, the amount of malware has also experienced a blowout growth. The emergence of malware has become a major problem that is urgently solved today. Early malware detection was mostly based on signature-based methods, but this traditional method relies too much on expert experience and has certain limitations. Currently, research on malware detection based on neural networks is growing explosively. The computational efficiency of neural networks depends partly on computer performance, but most current computers still have a von Neumann bottleneck, that is, after the memory capacit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56G06V10/764G06V10/77G06V10/82G06N3/04G06N3/08G11C13/00
CPCG06F21/562G06N3/08G11C13/0009G06N3/047G06N3/045G06F18/213G06F18/2414
Inventor 夏冰许馨月陈宇许冬冬冯国朋
Owner 河南省鼎信信息安全等级测评有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products