CN108573148A - It is a kind of that encryption script recognition methods is obscured based on morphological analysis - Google Patents
It is a kind of that encryption script recognition methods is obscured based on morphological analysis Download PDFInfo
- Publication number
- CN108573148A CN108573148A CN201710140949.5A CN201710140949A CN108573148A CN 108573148 A CN108573148 A CN 108573148A CN 201710140949 A CN201710140949 A CN 201710140949A CN 108573148 A CN108573148 A CN 108573148A
- Authority
- CN
- China
- Prior art keywords
- script
- sample
- morphology
- threshold value
- coverage rate
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/561—Virus type analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Virology (AREA)
- General Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Machine Translation (AREA)
Abstract
The present invention relates to a kind of to obscure encryption script recognition methods based on morphological analysis.This method is trained first based on human language set of letters in conjunction with the big data script file (non-malicious) of random acquisition on network, generates script dictionary;Then the dictionary is utilized, morphology coverage rate detection is carried out to another batch of big data script file (non-malicious) of random acquisition on network, determine the lowest threshold of morphology coverage rate, the ratio for counting the annotation amount and size of code of this batch of script file simultaneously, determines the highest threshold value of annotated code ratio;Finally in the actually detected stage, morphological analysis is carried out to sample to be tested and is analyzed with annotation amount, by assessing whether its morphology coverage rate is less than threshold value or whether annotation ratio is higher than threshold value, judges whether it is by obscuring encrypted malicious script.If it is determined that then further detecting whether it is malicious script with other existing detection methods for non-aliased encrypted sample.The present invention has very high detection efficiency and accuracy in detection.
Description
Technical field
The invention belongs to Malicious Code Detection technical fields, and in particular to it is a kind of based on morphological analysis for obscuring encryption
The detection method of script.
Background technology
With the development of information-intensive society, computer and networks is more and more extensive in the application of social every field, information system
The importance of system is also growing day by day.At the same time, malicious code attacks the harm brought also getting worse, is especially hidden in
Malicious code in all kinds of scripts such as vbs, js, since it is based entirely on the Content Organizing form of text, have transmission range it is wide,
The features such as cross-platform ability is strong, deformation encryption threshold is low, signature detection difficulty is big, it has also become current most common malicious code
Form.Such as break out in recent years it is a large amount of extort software by what the approach such as malious email were propagated, mostly to obscure plus
Malicious script after close is carrier, and grave danger is constituted to public safety and data safety.Therefore, for malicious script, spy
Be not obscure ciphering type malicious script detection be current information security field urgent need to resolve major issue.
The encryption method of obscuring of malicious script is divided into two major classes at present, first, to function name, variable name, line feed retraction style
Etc. being deformed, its static nature is eliminated;Second is that being inserted into a large amount of annotations floods or interrupt malicious code function fragment, it is quiet to reduce its
State feature weight.And current malicious script detection technique, usually using following several method:
1. the malicious code detecting method based on fingerprint recognition carries out static binary scanning to script file, and right
Than the existing malicious code feature in malicious code feature database, malicious script detection is realized.This method can only be directed to known evil
Meaning code characteristic is detected, and malicious script is text based explanation execution language, is had and is flexibly obscured very much encryption
Mode can bypass this kind of detection method easily.Such as it replaces characteristic variable name and function name, split sensitive features character string
Intert a large amount of nonsignificant datas etc. at various character combinations, as annotations in feature code.
2. the malicious code detecting method based on dynamic debugging uses debugger to track scripting host to malicious script solution
Implementation procedure is released, the various system actions occurred during this are captured, and analyze and wherein whether there is malicious act, to realize
Malicious Code Detection.It is produced from script file or scripting host since this method is not easy to define behavior, in addition analytic process
The manual intervention of a large amount of professions is needed, therefore is more suitable for a kind of analysis method.It is applied to context of detection, practical operation is difficult
Spend larger, accuracy is relatively low.
3. script file is placed in the virtual environments such as sandbox and carries out mould by the malicious code detecting method based on virtual execution
Quasi- to execute, its operational process of dynamic analysis extracts corelation behaviour feature, is compared with behavior white list, realizes malicious code inspection
It surveys.Since this method needs actual motion script file, to prevent malicious code from penetrating true environment, usually need to combine
The virtual machine techniques such as VMWare carry out detection work.For such methods, the on the one hand behavior of current a large amount of malicious codes can be according to
Rely special trigger condition, terminate that execution, network environment is untrue as detected if detecting virtual environment, terminates execution
Deng so that detection difficulty increases;On the other hand due to the light weight level characteristics of script type malicious code, cause its spread scope it is wide,
Explosive strong, at present in actual scene, this kind of detection method based on virtual execution still hardly possible is to meet performance requirements.
In conclusion the detection method of malicious script, major defect are at present:For the malice for obscuring encryption type
Code, the scarce capacity of rapid static detection;And dynamic testing method and virtual detection method are required to the artificial of a large amount of professions
Analysis is intervened, and faces behavior triggering difficulty larger problem and detection performance and be difficult to meet asking for actually detected scene demand
Topic.
Invention content
The present invention is a kind of malicious script detection method based on morphological analysis, and key problems-solving is to obscuring encryption
The quick identification of type malicious script.
The present invention based on ready-made (or existing) human language set of letters, adopts at random in conjunction on network first
The big data script file (non-malicious) of collection is trained, and generates the word lexicon suitable for script;Then the word is utilized
Allusion quotation carries out morphology coverage rate detection to another batch of big data script file (non-malicious) of random acquisition on network, determines non-evil
The lowest threshold for script file morphology coverage rate of anticipating, while the ratio of the annotation amount and size of code of this batch of script file is counted, really
Determine the highest threshold value of non-malicious script file annotation ratio;Finally in the actually detected stage, morphological analysis is carried out to sample file
It is analyzed with annotation amount, by assessing whether its morphology coverage rate is less than threshold value or whether annotation ratio is higher than threshold value, judges that it is
No process obscures encryption.This method thinks that using cryptographic means are obscured be effective ways and master of the malicious script around static detection
Syllabus, therefore encryption sample will be obscured and be regarded as malicious script.For being determined as that it is other existing that non-aliased encrypted sample then uses
Static detection method further detect whether it is malicious script.
The a kind of of the present invention obscures encryption malicious script detection method based on morphological analysis, and its step are as follows:
1) analysis dictionary file, arrange mankind's word list, form initial detection dictionary, then utilize reptile instrument from
A large amount of normal script files such as major main stream website crawl js, the vbs in internet, as dictionary training set.Count dictionary training
The token-category and word quantity of concentration.For the word not in dictionary, counts it and occurs in how many script file respectively,
If more than threshold value (script file as being more than 1/3), then illustrates that the word is the common word of script, be added to dictionary
In.After training, final script dictionary is formed.
2) reptile instrument is utilized to capture a large amount of normal script files such as js, vbs from the major main stream website in internet, as
Threshold-training collection.For each sample in training set, count word quantity wherein in script dictionary with not in script
The ratio of word quantity in dictionary, i.e. morphology coverage rate.After the morphology coverage rate of all samples has been calculated, selection is therein most
Lowest threshold of the small value as non-malicious script file morphology coverage rate.
3) each sample concentrated for Threshold-training, statistics are wherein used for the word quantity of annotation and the list for code
The ratio of word quantity, i.e. annotated code ratio.After the annotated code ratio of all samples has been calculated, select maximum value therein as non-
Malicious script file notes code than highest threshold value.
4) in the actually detected stage, for script file to be detected, its morphology coverage rate is calculated.If its morphology coverage rate
Less than the lowest threshold of non-malicious script file morphology coverage rate, then judge the script file for by obscuring encrypted malice foot
This document;
5) in the actually detected stage, for script file to be detected, its annotated code ratio is calculated.If its annotated code ratio
Higher than non-malicious script file annotated code than highest threshold value, then judge the script file for by obscuring encrypted malice foot
This document.
6) in the actually detected stage, for script file to be detected, if two above step is to determine that it is malice
Script then illustrates that the script is therefore to be examined using existing various static detection methods without obscuring encrypted plaintext script
Survey whether it is malicious script file.It is considered herein that being that malicious script bypasses the effective of static detection using cryptographic means are obscured
Method and main purpose, therefore encryption sample will be obscured and be regarded as malicious script.
7) testing result is recorded, and is reported to user.
Advantages of the present invention is as follows:
1. the present invention is based on morphological analysis, detection sample file whether by obscuring encryption, detection method with obscure encryption
The technical sophistication degree of means is unrelated, has very high detection accuracy.
2. the present invention is based on annotated code proportion grading, whether detection sample file by sensitive instructions is submerged in magnanimity rubbish
In information, the detection accuracy of the detection method based on static nature is improved.
3. the present invention is based on static scanning method, the dynamic behaviour of monitoring script engine is not needed, it also need not be to script
Code carries out semiology analysis or simulation executes, therefore has very high detection efficiency, and performance is sufficient in actual scene greatly
Measure the malicious script detection demand of outburst.
4. the present invention is using before existing malicious script static detection method, first to sample obscure encryption situation into
Row analysis, greatly improves the detection accuracy of existing detection method.
Description of the drawings
The dictionary training flow chart for obscuring encryption script recognition methods based on morphological analysis of Fig. 1 present invention.
The Threshold-training flow chart for obscuring encryption script recognition methods based on morphological analysis of Fig. 2 present invention.
The pattern detection flow chart for obscuring encryption script recognition methods based on morphological analysis of Fig. 3 present invention.
The test result figure of the rate of false alarm and rate of failing to report of Fig. 4 present invention.
Specific implementation mode
The technical solution that the invention will now be described in detail with reference to the accompanying drawings:
The present invention's obscures encryption script recognition methods based on morphological analysis, includes mainly three phases, before being respectively
The dictionary training of phase and the pattern detection stage of Threshold-training stage and later stage system in actual use.
The detailed step of dictionary training stage is as shown in Figure 1, include the following steps:
1, prepare lexicon file, this document is ready-made mankind's word list.
2, a large amount of normal script files such as js, vbs are captured from the major main stream website in internet using reptile instrument, as
Dictionary training set.
3, a training sample is selected, word type therein is analyzed, records all words not in lexicon file.
4, step 3 is repeated, all analyzes and has finished until the training sample file prepared in step 2.
5, a word not in lexicon file, statistics is selected to include the script file number of the word, that is, count non-
The frequency of occurrences of dictionary word.
6, for the script file number counted in step 5, if it exceeds in training set sample total number 1/3, then
The word selected in step 5 is added in lexicon file.
7, step 5, step 6 are repeated, all analyzes and finishes until all words not in dictionary of record.
8, so far, the lexicon file suitable for script, i.e. script dictionary are formed.
The detailed step in Threshold-training stage is as shown in Fig. 2, include the following steps:
9, a large amount of normal script files such as js, vbs are captured from the major main stream website in internet using reptile instrument, as
Threshold-training collection.
10, a training sample is selected, statistics wherein how many word is in script dictionary, how many word is not in script
In dictionary, and the quantity ratio of both words is calculated, as the morphology coverage rate of the sample, recorded.
11, the training sample selected for step 10, for annotating, how many word is used for statistics wherein how many word
Code, and the quantity ratio of both words is calculated, as the annotated code ratio (or annotation ratio) of the sample, record
Come.
12, step 10 and step 11 are repeated, has analyzed and has finished until whole training samples of step 9 preparation.
13, minimum value is found out from the morphology coverage rate recorded, as non-malicious script file morphology coverage rate
Lowest threshold.
14, find out maximum value from the annotated code ratio recorded, as non-malicious script file annotated code than
Highest threshold value.
Actual sample detects the detailed step of training stage as shown in figure 3, including the following steps:
15, the morphology coverage rate of the script dictionary, the formation of Threshold-training stage that are formed to the system input dictionary training stage
Threshold value and annotated code prepare script sample set to be detected than threshold value.
16, a script sample file to be detected is selected, counts wherein how many word in script dictionary, how many
Word calculates the quantity ratio of both words not in script dictionary, the morphology coverage rate as the sample.
17, for calculated morphology coverage rate in step 16, if being less than morphology coverage rate threshold value, judge the sample
Obscure encrypted malicious script file to pass through, and by test results report to user.
18, for calculated morphology coverage rate in step 16, if being higher than morphology coverage rate threshold value, the sample is counted
In how many word for annotating, how many word is used for code, and calculates the quantity ratio of both words, as the sample
Annotated code ratio.
19, for calculated annotated code ratio in step 18, if being higher than annotated code threshold value, judge that the sample is
By obscuring encrypted malicious script file, and by test results report to user.
If 20, calculated morphology coverage rate is higher than morphology coverage rate threshold value in step 16, and is calculated in step 18
Annotated code ratio less than annotated code than threshold value, then judge the sample for plaintext script, thread called in the form of plug-in unit
Malicious script detection method is detected it, and to user report testing result.
21, step 16 is repeated to step 20, is all analyzed and is finished until the sample to be tested this document prepared in step 15, ties
The entire detection process of beam.
A kind of malicious script detection method and system, key problems-solving based on morphological analysis proposed by the present invention are
To obscuring the quick identification of ciphering type malicious script.It for a person skilled in the art, can oneself selection as needed
Original lexicon file and dictionary training set and Threshold-training collection.In detection process, system is judged to adding without obscuring
Close plaintext script sample oneself can select (or addition) existing malicious script detection module, such as various biographies as needed
System antivirus software.Malicious script to carry out high efficiency, high-accuracy detects work.
The present invention has crawled 1000 white samples from Sina and Tencent website, wherein 500 are used to train word lexicon,
500 for training threshold value.For this experiment, the morphology coverage rate threshold value trained is 50%, and annotated code is than threshold value
4.Next 900 black samples are had collected and carry out rate of failing to report tests, and from Netease and www.baidu.com crawled 900 white samples into
Row rate of false alarm is tested.To make test result be more clear, if " threat level " is " (1- morphology coverage rate) * 100% ", and will
Annotation ratio is more than that the threat level of the sample of threshold value is provided directly as 60%.Therefore, when morphology coverage rate threshold value value is
When 50%, sample of the threat level more than 50% is judged as by obscuring encrypted malice sample, and threat level is less than 50%
Sample be judged as normal sample.
Test results are shown in figure 4, and in rate of false alarm test, the threat level maximum value of white sample is 45%, illustrates this
The minimum value of lot sample this morphology coverage rate is 55%, with threshold value 50% compared to still having at a distance from 5%, that is, is directed to test sample, this
Method is not reported by mistake;In rate of failing to report test, the threat level of only 28 black samples is less than 50%, illustrates there are 28 samples
Not only annotation ratio is not above threshold value 4 for this, and morphology coverage rate is also above threshold value 50%.Through manual analysis, this 28 samples
It is that and can test sample be directed to by traditional antivirus software identifications such as kappa this bases without obscuring encrypted malicious code,
This method is not failed to report.
Although disclosing specific embodiments of the present invention and attached drawing for the purpose of illustration, its object is to help to understand the present invention
Content and implement according to this, it will be appreciated by those skilled in the art that:In the essence for not departing from the present invention and the attached claims
In god and range, various substitutions, changes and modifications are all possible.Therefore, the present invention should not be limited to most preferred embodiment and attached
Figure disclosure of that, the scope of protection of present invention is subject to the scope defined in the claims.
Claims (10)
1. a kind of obscuring encryption script recognition methods based on morphological analysis, step includes:
1) before testing, based on existing human language set of letters, in conjunction with the non-malicious of random acquisition on network
Big data script file is trained, and generates the word lexicon suitable for script;
2) morphology coverage rate before testing, is carried out to another batch of big data script file of the non-malicious of random acquisition on network
Detection, determines the lowest threshold of the morphology coverage rate of non-malicious script file, at the same count the annotation amount of this batch of script file with
The ratio of size of code determines the highest threshold value of the annotation ratio of non-malicious script file;
3) in actually detected, morphological analysis is carried out to sample to be tested and is analyzed with annotation amount, is by assessing its morphology coverage rate
It is no whether to be higher than the highest threshold value less than the lowest threshold or annotation ratio, judge whether it is by obscuring encrypted evil
Meaning script.
2. the method as described in claim 1, which is characterized in that for non-aliased encrypted plaintext script, with existing quiet
State detection method further detects whether it is malicious script.
3. the method as described in claim 1, which is characterized in that in step 1) existing human language set of letters be include ox
A variety of dictionary set for including significant word including the dictionary of Tianjin;Big data script file in step 1) and step 2) passes through
Reptile captures from portal website.
4. the method as described in claim 1, which is characterized in that the training method in step 1) is:It is more than threshold value that will appear in
Word in a script file, not in dictionary is added to dictionary.
5. the method as described in claim 1, which is characterized in that the computational methods of morphology coverage rate in step 2) and step 3)
For:Each word in sample file is analyzed, word quantity and the not word in script dictionary in script dictionary are calculated
The ratio of quantity, i.e. morphology coverage rate.
6. the method as described in claim 1, which is characterized in that the morphology coverage rate threshold value determination method in step 2) is:
Morphology coverage rate is calculated for all samples in training set, and selects minimum value therein as threshold value.
7. the method as described in claim 1, which is characterized in that the computational methods of the annotation ratio in step 2) and step 3)
For:Each word in sample file is analyzed, the ratio of the word quantity and the word quantity for code for annotation is calculated,
Annotate ratio.
8. the method as described in claim 1, which is characterized in that the determination method of the annotation proportion threshold value in step 2) is:Needle
Annotation ratio is calculated to all samples in training set, and selects maximum value therein as threshold value.
9. the method as described in claim 1, which is characterized in that obscure encrypted detection method to code morphing formula in step 3)
For:The morphology coverage rate of sample is calculated, and it is compared with the threshold value of morphology coverage rate, if the morphology coverage rate of sample is low
In threshold value, then illustrate comprising a large amount of meaningless words in the sample, i.e., and the indirect hand for coming from human programmers, it is determined that
The sample is by obscuring encryption.
10. the method as described in claim 1, which is characterized in that cover class to feature in step 3) and obscure encrypted detection side
Method is:The annotation ratio of sample is calculated, and it is compared with the threshold value of annotation ratio, if the annotated code ratio of sample is higher than
Threshold value then illustrates to attempt to a large amount of words comprising a large amount of annotations in the sample and flood feature code with character string, so sentencing
The fixed sample is by obscuring encryption.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710140949.5A CN108573148B (en) | 2017-03-10 | 2017-03-10 | Confusion encryption script identification method based on lexical analysis |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710140949.5A CN108573148B (en) | 2017-03-10 | 2017-03-10 | Confusion encryption script identification method based on lexical analysis |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108573148A true CN108573148A (en) | 2018-09-25 |
CN108573148B CN108573148B (en) | 2022-05-27 |
Family
ID=63577969
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710140949.5A Active CN108573148B (en) | 2017-03-10 | 2017-03-10 | Confusion encryption script identification method based on lexical analysis |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108573148B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110933104A (en) * | 2019-12-11 | 2020-03-27 | 成都卫士通信息产业股份有限公司 | Malicious command detection method, device, equipment and medium |
CN115225294A (en) * | 2021-04-16 | 2022-10-21 | 深信服科技股份有限公司 | Confusion script collection method, device, equipment and medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060271971A1 (en) * | 2003-06-13 | 2006-11-30 | Jonathan Peter Vincent Drazin | Interactive television system |
CN1924866A (en) * | 2006-09-28 | 2007-03-07 | 北京理工大学 | Static feature based web page malicious scenarios detection method |
CN101901322A (en) * | 2009-07-10 | 2010-12-01 | 卡巴斯基实验室封闭式股份公司 | Be used to detect the system and method for obfuscated malware |
US20110239294A1 (en) * | 2010-03-29 | 2011-09-29 | Electronics And Telecommunications Research Institute | System and method for detecting malicious script |
CN105868630A (en) * | 2016-03-24 | 2016-08-17 | 中国科学院信息工程研究所 | Malicious PDF document detection method |
-
2017
- 2017-03-10 CN CN201710140949.5A patent/CN108573148B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060271971A1 (en) * | 2003-06-13 | 2006-11-30 | Jonathan Peter Vincent Drazin | Interactive television system |
CN1924866A (en) * | 2006-09-28 | 2007-03-07 | 北京理工大学 | Static feature based web page malicious scenarios detection method |
CN101901322A (en) * | 2009-07-10 | 2010-12-01 | 卡巴斯基实验室封闭式股份公司 | Be used to detect the system and method for obfuscated malware |
US20110239294A1 (en) * | 2010-03-29 | 2011-09-29 | Electronics And Telecommunications Research Institute | System and method for detecting malicious script |
CN105868630A (en) * | 2016-03-24 | 2016-08-17 | 中国科学院信息工程研究所 | Malicious PDF document detection method |
Non-Patent Citations (2)
Title |
---|
MEINING NIE: "Xede: Practical Exploit Early Detection", 《INTERNATIONAL SYMPOSIUM ON RECENT ADVANCES IN INTRUSION DETECTION》 * |
徐青: "JavaScript恶意代码检测技术研究", 《中国优秀硕士学位论文全文数据库 信息科技辑》 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110933104A (en) * | 2019-12-11 | 2020-03-27 | 成都卫士通信息产业股份有限公司 | Malicious command detection method, device, equipment and medium |
CN115225294A (en) * | 2021-04-16 | 2022-10-21 | 深信服科技股份有限公司 | Confusion script collection method, device, equipment and medium |
Also Published As
Publication number | Publication date |
---|---|
CN108573148B (en) | 2022-05-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111523117A (en) | Android malicious software detection and malicious code positioning system and method | |
Carmony et al. | Extract Me If You Can: Abusing PDF Parsers in Malware Detectors. | |
US9747452B2 (en) | Method of generating in-kernel hook point candidates to detect rootkits and the system thereof | |
EP3848833B1 (en) | Analysis function imparting device, analysis function imparting method, and analysis function imparting program | |
CN109684840A (en) | Based on the sensitive Android malware detection method for calling path | |
CN109753800A (en) | Merge the Android malicious application detection method and system of frequent item set and random forests algorithm | |
CN109922052A (en) | A kind of malice URL detection method of combination multiple characteristics | |
CN108268777A (en) | A kind of similarity detection method that unknown loophole discovery is carried out using patch information | |
CN103428196A (en) | URL white list-based WEB application intrusion detecting method and apparatus | |
WO2018127794A1 (en) | Management of security vulnerabilities | |
CN109711163A (en) | Android malware detection method based on API Calls sequence | |
CN107103237A (en) | A kind of detection method and device of malicious file | |
CN104766015A (en) | Function call based dynamic detection method for buffer overflow vulnerability | |
Shin et al. | SQLUnitgen: Test case generation for SQL injection detection | |
Zuo | Defense of Computer Network Viruses Based on Data Mining Technology. | |
CN108573148A (en) | It is a kind of that encryption script recognition methods is obscured based on morphological analysis | |
Alshamrani | Design and analysis of machine learning based technique for malware identification and classification of portable document format files | |
KR101327740B1 (en) | apparatus and method of collecting action pattern of malicious code | |
Bai et al. | Dynamic k-gram based software birthmark | |
Liao et al. | Automated detection and classification for packed android applications | |
Efe et al. | Malware visualization techniques | |
EP4202741A1 (en) | System and method of synthesizing potential malware for predicting a cyberattack | |
Yu et al. | A unified malicious documents detection model based on two layers of abstraction | |
Lee et al. | Causal program dependence analysis | |
Ramesh et al. | Integrated malware analysis using markov based model in machine learning |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |