CN106685964B - 基于恶意网络流量词库的恶意软件检测方法及系统 - Google Patents
基于恶意网络流量词库的恶意软件检测方法及系统 Download PDFInfo
- Publication number
- CN106685964B CN106685964B CN201611243439.2A CN201611243439A CN106685964B CN 106685964 B CN106685964 B CN 106685964B CN 201611243439 A CN201611243439 A CN 201611243439A CN 106685964 B CN106685964 B CN 106685964B
- Authority
- CN
- China
- Prior art keywords
- word
- malicious
- network traffic
- normal
- word set
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000001514 detection method Methods 0.000 title claims abstract description 57
- 239000013598 vector Substances 0.000 claims abstract description 39
- 238000012549 training Methods 0.000 claims abstract description 24
- 238000001914 filtration Methods 0.000 claims description 27
- 238000000034 method Methods 0.000 claims description 23
- 230000011218 segmentation Effects 0.000 claims description 21
- 230000008569 process Effects 0.000 claims description 12
- 238000000546 chi-square test Methods 0.000 claims description 10
- 238000012545 processing Methods 0.000 claims description 10
- 238000007635 classification algorithm Methods 0.000 claims description 6
- 238000010801 machine learning Methods 0.000 claims description 5
- 238000010606 normalization Methods 0.000 claims description 4
- 230000008859 change Effects 0.000 claims description 2
- 238000012512 characterization method Methods 0.000 claims 2
- 238000004422 calculation algorithm Methods 0.000 description 2
- 210000001072 colon Anatomy 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000006399 behavior Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000003066 decision tree Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000003058 natural language processing Methods 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 238000012706 support-vector machine Methods 0.000 description 1
- 230000009897 systematic effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Health & Medical Sciences (AREA)
- Virology (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Health & Medical Sciences (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer And Data Communications (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
Claims (5)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611243439.2A CN106685964B (zh) | 2016-12-29 | 2016-12-29 | 基于恶意网络流量词库的恶意软件检测方法及系统 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611243439.2A CN106685964B (zh) | 2016-12-29 | 2016-12-29 | 基于恶意网络流量词库的恶意软件检测方法及系统 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106685964A CN106685964A (zh) | 2017-05-17 |
CN106685964B true CN106685964B (zh) | 2020-10-30 |
Family
ID=58873260
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611243439.2A Active CN106685964B (zh) | 2016-12-29 | 2016-12-29 | 基于恶意网络流量词库的恶意软件检测方法及系统 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106685964B (zh) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108470027A (zh) * | 2018-03-30 | 2018-08-31 | 广州优视网络科技有限公司 | 色情应用识别方法和装置、计算设备和存储介质 |
CN108540471B (zh) * | 2018-04-08 | 2020-10-02 | 南京邮电大学 | 移动应用网络流量聚类方法、计算机可读存储介质和终端 |
CN109117634B (zh) * | 2018-09-05 | 2020-10-23 | 济南大学 | 基于网络流量多视图融合的恶意软件检测方法及系统 |
CN111062034A (zh) * | 2018-10-16 | 2020-04-24 | 中移(杭州)信息技术有限公司 | 一种Webshell文件检测方法、装置、电子设备及存储介质 |
CN111368289B (zh) * | 2018-12-26 | 2023-08-29 | 中兴通讯股份有限公司 | 一种恶意软件检测方法和装置 |
CN111651761B (zh) * | 2019-03-04 | 2023-04-14 | 腾讯科技(深圳)有限公司 | 一种黑产电子设备检测方法、装置、服务器及存储介质 |
CN113705619B (zh) * | 2021-08-03 | 2023-09-12 | 广州大学 | 一种恶意流量检测方法、系统、计算机及介质 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102779249A (zh) * | 2012-06-28 | 2012-11-14 | 奇智软件(北京)有限公司 | 恶意程序检测方法及扫描引擎 |
CN102821002A (zh) * | 2011-06-09 | 2012-12-12 | 中国移动通信集团河南有限公司信阳分公司 | 网络流量异常检测方法和系统 |
CN103473506A (zh) * | 2013-08-30 | 2013-12-25 | 北京奇虎科技有限公司 | 用于识别恶意apk文件的方法和装置 |
CN104598813A (zh) * | 2014-12-09 | 2015-05-06 | 西安电子科技大学 | 一种基于集成学习和半监督svm的计算机入侵检测方法 |
CN105007282A (zh) * | 2015-08-10 | 2015-10-28 | 济南大学 | 面向网络服务提供商的恶意软件网络行为检测方法及系统 |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9038178B1 (en) * | 2012-06-25 | 2015-05-19 | Emc Corporation | Detection of malware beaconing activities |
-
2016
- 2016-12-29 CN CN201611243439.2A patent/CN106685964B/zh active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102821002A (zh) * | 2011-06-09 | 2012-12-12 | 中国移动通信集团河南有限公司信阳分公司 | 网络流量异常检测方法和系统 |
CN102779249A (zh) * | 2012-06-28 | 2012-11-14 | 奇智软件(北京)有限公司 | 恶意程序检测方法及扫描引擎 |
CN103473506A (zh) * | 2013-08-30 | 2013-12-25 | 北京奇虎科技有限公司 | 用于识别恶意apk文件的方法和装置 |
CN104598813A (zh) * | 2014-12-09 | 2015-05-06 | 西安电子科技大学 | 一种基于集成学习和半监督svm的计算机入侵检测方法 |
CN105007282A (zh) * | 2015-08-10 | 2015-10-28 | 济南大学 | 面向网络服务提供商的恶意软件网络行为检测方法及系统 |
Also Published As
Publication number | Publication date |
---|---|
CN106685964A (zh) | 2017-05-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106685964B (zh) | 基于恶意网络流量词库的恶意软件检测方法及系统 | |
CN109309630B (zh) | 一种网络流量分类方法、系统及电子设备 | |
CN107153789B (zh) | 利用随机森林分类器实时检测安卓恶意软件的方法 | |
CN105740712B (zh) | 基于贝叶斯网络的Android恶意行为检测方法 | |
CN110572382A (zh) | 基于smote算法和集成学习的恶意流量检测方法 | |
WO2020073714A1 (zh) | 训练样本获取方法,账户预测方法及对应装置 | |
CN106845230A (zh) | 基于恶意网络流量词库的恶意软件检测可视化方法及系统 | |
CN110532564B (zh) | 一种基于cnn和lstm混合模型的应用层协议在线识别方法 | |
CN103294817A (zh) | 一种基于类别分布概率的文本特征抽取方法 | |
CN107483451B (zh) | 基于串并行结构网络安全数据处理方法及系统、社交网络 | |
CN103679012A (zh) | 一种可移植可执行文件的聚类方法和装置 | |
CN109871686A (zh) | 基于图标表示和软件行为一致性分析的恶意程序识别方法及装置 | |
CN102402693A (zh) | 处理包含字符的图像的方法和设备 | |
CN111488994A (zh) | 正样本学习模型评估方法及装置 | |
CN106778851A (zh) | 基于手机取证数据的社交关系预测系统及其方法 | |
Liu et al. | Coupled fuzzy k-nearest neighbors classification of imbalanced non-IID categorical data | |
CN115510445A (zh) | 一种基于深度学习的Android恶意程序检测方法 | |
WO2023116561A1 (zh) | 一种实体提取方法、装置、电子设备及存储介质 | |
CN115037543A (zh) | 一种基于双向时间卷积神经网络的异常网络流量检测方法 | |
Xu et al. | HTtext: A TextCNN-based pre-silicon detection for hardware Trojans | |
CN113722713A (zh) | 一种恶意代码检测的方法、装置、电子设备及存储介质 | |
CN106685963B (zh) | 一种恶意网络流量词库的建立方法及建立系统 | |
WO2024051196A1 (zh) | 恶意代码检测方法、装置、电子设备及存储介质 | |
Zhu et al. | FSNet: android malware detection with only one feature | |
Li et al. | Intrusion detection using temporal convolutional networks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB03 | Change of inventor or designer information | ||
CB03 | Change of inventor or designer information |
Inventor after: Chen Zhenxiang Inventor after: Wang Shanshan Inventor after: Sun Runyuan Inventor after: Yang Bo Inventor after: Peng Lizhi Inventor after: Liu Kun Inventor before: Wang Shanshan Inventor before: Chen Zhenxiang Inventor before: Sun Runyuan Inventor before: Yang Bo Inventor before: Peng Lizhi Inventor before: Liu Kun |
|
GR01 | Patent grant | ||
GR01 | Patent grant |