CN108920958A - Detect method, apparatus, medium and the equipment of pe file abnormal behaviour - Google Patents

Detect method, apparatus, medium and the equipment of pe file abnormal behaviour Download PDF

Info

Publication number
CN108920958A
CN108920958A CN201810771640.0A CN201810771640A CN108920958A CN 108920958 A CN108920958 A CN 108920958A CN 201810771640 A CN201810771640 A CN 201810771640A CN 108920958 A CN108920958 A CN 108920958A
Authority
CN
China
Prior art keywords
file
detected
valid data
data
sample
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810771640.0A
Other languages
Chinese (zh)
Inventor
郭景楠
王建磊
何华荣
王志
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen United Soft Polytron Technologies Inc
Original Assignee
Shenzhen United Soft Polytron Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen United Soft Polytron Technologies Inc filed Critical Shenzhen United Soft Polytron Technologies Inc
Priority to CN201810771640.0A priority Critical patent/CN108920958A/en
Publication of CN108920958A publication Critical patent/CN108920958A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The present invention provides a kind of method, apparatus, medium and equipment for detecting pe file abnormal behaviour.The method, including:Receive file to be detected;Extract the characteristic of the file to be detected;The characteristic is handled, valid data are obtained;According to the valid data, based on the prediction model using support vector machines ONECLASS model training, predicts whether the file to be detected is abnormal document, obtain prediction result;The prediction result is exported to user.By using the prediction model of support vector machines ONECLASS model training, 0-day attack can be recognized accurately, with the automaticity that conventional method is incomparable, timeliness, the good advantage such as validity.

Description

Detect method, apparatus, medium and the equipment of pe file abnormal behaviour
Technical field
The present invention relates to field of information security technology, and in particular to it is a kind of detect pe file abnormal behaviour method, apparatus, Medium and equipment.
Background technique
With the fast development of internet, network security problem becomes increasingly conspicuous, and the continuous upgrading of virus technology is to existing anti- Virus technology brings great challenge.In the prior art, main to detect pe file using rule or the method for dynamic sandbox Whether abnormal, for traditional detection method there are hysteresis quality, this detection method does not have timeliness, cannot cope with the hacker increasingly changed Attack, not can solve zero-day attacks.
Summary of the invention
For the defects in the prior art, the present invention provides a kind of method for detecting pe file abnormal behaviour, can be accurate Identify that 0-day is attacked, with the automaticity that conventional method is incomparable, timeliness, the good advantage such as validity.
In a first aspect, the present invention provides a kind of methods for detecting pe file abnormal behaviour, including:
Receive file to be detected;
Extract the characteristic of the file to be detected;
The characteristic is handled, valid data are obtained;
Institute is predicted based on the prediction model using support vector machines ONECLASS model training according to the valid data State whether file to be detected is abnormal document, obtains prediction result;
The prediction result is exported to user.
Optionally, described that the characteristic is handled, valid data are obtained, including:
The characteristic is standardized, standard feature data are obtained;
Dimension-reduction treatment is carried out to the standard feature data, obtains valid data.
Optionally, described that dimension-reduction treatment is carried out to the standard feature data, valid data are obtained, including:
Using principal component analytical method, dimension-reduction treatment is carried out to the standard feature data, obtains valid data.
Optionally, according to the valid data, based on the prediction mould using support vector machines ONECLASS model training Before the step of type predicts whether the file to be detected is abnormal document, obtains prediction result, further include:
Obtain sample pe file;
Extract the sample characteristics data of the sample pe file;
The sample characteristics data are handled, sample valid data are obtained;
According to the sample valid data, the sample valid data are carried out using support vector machines ONECLASS model Training, establishes prediction model.
Optionally, the method further includes:
When predicting the file to be detected is abnormal document, it is based on the prediction model, predicts the file to be detected Dangerous probability, and to user's output dangerous probability.
Second aspect, the present invention provide a kind of device for detecting pe file abnormal behaviour, including:
File reception module, for receiving file to be detected;
Characteristic extracting module, for extracting the characteristic of the file to be detected;
Data processing module obtains valid data for handling the characteristic;
Prediction module is used for according to the valid data, based on using the pre- of support vector machines ONECLASS model training Model is surveyed, predicts whether the file to be detected is abnormal document, obtains prediction result;
Output module, for exporting the prediction result to user.
The third aspect, the present invention provide a kind of computer readable storage medium, are stored thereon with computer program, the program The method of one of first aspect detection pe file abnormal behaviour is realized when being executed by processor.
Fourth aspect, the present invention provide a kind of equipment for detecting pe file abnormal behaviour, including:Memory, processor and The computer program that can be run on a memory and on a processor is stored, the processor realizes first when executing described program The method of one of aspect detection pe file abnormal behaviour.
A kind of method detecting pe file abnormal behaviour provided by the invention, by predicting whether file to be detected is abnormal File is able to use family and quickly understands whether file to be detected is abnormal document, can judge before pe running paper Whether it is abnormal document, has foreseeability.The support vector machines ONECLASS model algorithm that the present invention uses belongs to engineering One kind of learning method, it is only necessary to collect normal pe file characteristic, and be modeled just for normal data, be able to solve hacker The ever-changing situation of behavior, and 0-day attack can be recognized accurately.Pe file is examined whether to have by using this method different Chang Hangwei, with the automaticity that conventional method is incomparable, timeliness, the good advantage such as validity.The present invention is based on support The Outlier Detection Algorithm of vector machine ONECLASS model is not necessarily to Virus Sample, need to only be trained, can identify to normal pe sample Any virus except normal pe paper sample.
A kind of device, a kind of computer readable storage medium and one kind detecting pe file abnormal behaviour provided by the invention Detect pe file abnormal behaviour equipment, with it is above-mentioned it is a kind of detect pe file abnormal behaviour method for identical invention structure Think, beneficial effect having the same.
Detailed description of the invention
It, below will be to specific in order to illustrate more clearly of the specific embodiment of the invention or technical solution in the prior art Embodiment or attached drawing needed to be used in the description of the prior art are briefly described.In all the appended drawings, similar element Or part is generally identified by similar appended drawing reference.In attached drawing, each element or part might not be drawn according to actual ratio.
Fig. 1 is a kind of flow chart of method for detecting pe file abnormal behaviour provided by the invention;
Fig. 2 is a kind of schematic diagram of device for detecting pe file abnormal behaviour provided by the invention.
Specific embodiment
It is described in detail below in conjunction with embodiment of the attached drawing to technical solution of the present invention.Following embodiment is only used for Clearly illustrate technical solution of the present invention, therefore be intended only as example, and cannot be used as a limitation and limit protection of the invention Range.
It should be noted that unless otherwise indicated, technical term or scientific term used in this application should be this hair The ordinary meaning that bright one of ordinary skill in the art are understood.
The present invention provides a kind of method, apparatus, medium and equipment for detecting pe file abnormal behaviour.With reference to the accompanying drawing The embodiment of the present invention is illustrated.
Referring to FIG. 1, Fig. 1 is a kind of stream of the method for detection pe file abnormal behaviour that the specific embodiment of the invention provides Cheng Tu, a kind of method detecting pe file abnormal behaviour provided in this embodiment, including:
Step S101:Receive file to be detected.
Step S102:Extract the characteristic of the file to be detected.
Step S103:The characteristic is handled, valid data are obtained.
Step S104:According to the valid data, based on the prediction mould using support vector machines ONECLASS model training Type predicts whether the file to be detected is abnormal document, obtains prediction result.
Step S105:The prediction result is exported to user.
Wherein, file to be detected is the pe file that new needs detect.
Wherein, characteristic is the structural characterization data of pe file to be detected, be can specifically include:The load of pe file DLL, the function of calling, joint number evidence, the data extracted in section table, pe file header etc..
Characteristic may include the feature of five aspects, specific as follows:
(1) the DLL sequence that collection virus is often called, the DLL feature of pe file, including:WSOCK.DLL,WS2_ 81 features such as 32.DLL, WINSOCK.DLL, RSRC32.DLL, KERNEL32.DLL.
(2) the function sequence that virus is often called is collected, including:DeleteFileA,FindClose, FindNextFileA, CryptGenKey etc. extract the total number for the function that pe file is called, and common comprising virus Function weight sum totally 32 features.
(3) the Export table in the DATA_DIRECTORY of pe file, Import table, Resourcetable Deng 32 features.
(4) pe file data section .TEXT .DATA .RSRC in code segment, the VirtualSize such as .RELOC, 30 features such as SizeOfRawData, Characteristics.
Machine in (5) filesize, cert_status of pe file, file header table, NumberOfSections, NumberOfSymbols, Characteristics are extracted in optioal header table AddressOfEntryPoint、BaseOfCode、BaseOfData、ImageBase、Subsystem、 13 features such as NumberOfRvaAndSizes, LoaderFlags.
In the present invention, characteristic is not limited to the characteristic of above-mentioned five aspects, can also include other sides The characteristic in face, this is all within the scope of the present invention.
The support vector machines ONECLASS model algorithm that the present invention uses belongs to one kind of machine learning method, it is only necessary to receive Collect normal pe file characteristic, and modeled just for normal data, is able to solve the ever-changing situation of hacker's behavior, and 0-day attack can be recognized accurately.It examines whether pe file has abnormal behaviour by using this method, there is conventional method not Analogous automaticity, timeliness, the good advantage such as validity.The present invention is based on the different of support vector machines ONECLASS model Normal detection algorithm is not necessarily to Virus Sample, need to only be trained to normal pe sample, can identify appointing except normal pe paper sample What virus.
By predicting whether file to be detected is abnormal document, be able to use family quickly understand file to be detected whether be Abnormal document can judge whether it is abnormal document before pe running paper, have foreseeability.
It is described that the characteristic is handled in a specific embodiment provided by the invention, obtain significant figure According to, including:The characteristic is standardized, standard feature data are obtained;The standard feature data are carried out Dimension-reduction treatment obtains valid data.
Since the unit dimension of the characteristic of the file to be detected extracted is different, need to be converted to characteristic together One dimension, therefore after the characteristic for extracting file to be detected, it needs to pre-process characteristic, by characteristic Same dimension is converted to, subsequent processing is facilitated.
After being standardized to characteristic, obtain standard feature data, due to standard feature data dimension compared with Greatly, cause difficulty in computation larger, therefore, it is necessary to carry out dimension-reduction treatment to standard feature data.It is carried out to standard feature data When dimension-reduction treatment, principal component analytical method (PCA) can be used, dimension-reduction treatment is carried out to standard feature data, obtains significant figure According to.
It is by the standard feature of various dimensions when carrying out dimension-reduction treatment to standard feature data using principal component analytical method Data are converted into the standard feature data of a few overall dimensions.Select Error is minimum, being capable of convergent most suitable dimension.
In a specific embodiment provided by the invention, according to the valid data, it is based on using support vector machines The prediction model of ONECLASS model training predicts whether the file to be detected is abnormal document, obtains the step of prediction result Before rapid, can also include:Obtain sample pe file;Extract the sample characteristics data of the sample pe file;To the sample Characteristic is handled, and sample valid data are obtained;According to the sample valid data, using support vector machines ONECLASS Model is trained the sample valid data, establishes prediction model.
Before the abnormality for predicting file to be detected, need to establish prediction model.When establishing prediction model, firstly, Need to obtain sample pe file;Then, extract sample pe file sample characteristics data, wherein sample characteristics data with it is to be checked The dimension for surveying the characteristic that file extracts is identical.
It after extracting sample characteristics data, needs to handle sample characteristics data, obtains sample valid data.? It also include the standardization to sample characteristics data, with the above-mentioned feature to file to be detected when handling sample characteristics data The course of standardization process of data is identical;Dimension-reduction treatment is carried out to sample characteristics data of the standardization after complete, and it is above-mentioned right The dimension-reduction treatment process of the standard feature data of file to be detected is identical.
Sample valid data are obtained after dimension-reduction treatment, finally, further according to sample valid data, using support vector machines ONECLASS model is trained sample valid data, selects optimal models, and saves corresponding model result and parameter, Using the optimal models selected as prediction model.
The core concept of support vector machines ONECLASS model algorithm is that had by SVM (support vector machines) training The hyperplane of maximum class interval, and then a classification problem is converted to a special two-value classification problem.Known input sample This set D={ xi},x∈RN, 1≤i≤n, also assumed that one from former space RNTo the mapping phi of infinite dimensional space χ, and Meet φ (xi)∈χ.Problem is converted to find such two-value classifier, so that enumerating most of normal samples Sample point classification in the high-density region of point is denoted as "+1 ", and is located at the exceptional sample point classification except this high-density region It is denoted as " -1 ".Then the solution procedure of the problem is as follows:
In formula, w ∈ χ and b ∈ R indicate hyperplane parameter, and vn indicates the maximum value and supporting vector number of exceptional sample points Minimum value.Using Lagrangian:
Then to w, ξi, b minimized, is calculated:
By above-mentioned formula, Lagrangian can be simplified, obtain Wolfe dual problem:
B can be according to satisfaction in formulaThe supporting vector x of conditioniIt obtains, calculation formula is as follows:
Classification function f (x) can be obtained as a result,:
ONECLASS model is finally to solve for nonlinear programming problem of the dual problem under constraint condition, i.e., according to sample Set D finds out the parameter a for making Wolfe dual problem reach minimum valueiAnd b, then obtain classification function f (x).
After data prediction and dimension-reduction treatment, sample matrix D={ x is obtainedi(i=1 ... n), row vector represents one Sample.K (the x in Wolfe dual problem is calculated according to gaussian kernel function formulai,xj)。
Wherein, K (xi,xj)=exp (- | | xi-xj||2/(2*sigma2))
By K (xi,xj) bring Wolfe dual problem into, parameter a is then found out according to SMO algorithmiAnd b, then utilize classification Function f (x) calculates each sample, represents and is positive often as f (x)=1, when f (x)=- 1 is represented as virus.
The sigma of vn and calculating kernel function in algorithm implementation in Wolfe dual problem are to belong to hyper parameter, can root Optimal value is selected according to training error.
In a specific embodiment provided by the invention, the method can also include:When the prediction text to be detected When part is abnormal document, it is based on the prediction model, predicts the dangerous probability of the file to be detected, and to described in user's output Dangerous probability.
When according to classification function calculate file to be detected be abnormal document after, the danger of the abnormal document can also be calculated Probability, its calculation formula is:
By calculating the dangerous probability of abnormal document, it is able to use the risk that family understands the abnormal document, and then judge Whether the abnormal document can continue to execute, and avoid ignoring the lower abnormal document of risk.
More than, for a kind of method for detecting pe file abnormal behaviour provided by the invention.
It is corresponding based on inventive concept identical with a kind of above-mentioned detection method of pe file abnormal behaviour, this Inventive embodiments additionally provide a kind of device for detecting pe file abnormal behaviour, as shown in Figure 2.Due to the basic phase of Installation practice Like and embodiment of the method, so describing fairly simple, the relevent part can refer to the partial explaination of embodiments of method.
The present invention provides a kind of device for detecting pe file abnormal behaviour, including:
File reception module 101, for receiving file to be detected;
Characteristic extracting module 102, for extracting the characteristic of the file to be detected;
Data processing module 103 obtains valid data for handling the characteristic;
Prediction module 104 is used for according to the valid data, based on using support vector machines ONECLASS model training Prediction model predicts whether the file to be detected is abnormal document, obtains prediction result;
Output module 105, for exporting the prediction result to user.
In a specific embodiment provided by the invention, the data processing module 103, including:
Standardization unit obtains standard feature data for being standardized to the characteristic;
Dimension-reduction treatment unit obtains valid data for carrying out dimension-reduction treatment to the standard feature data.
In a specific embodiment provided by the invention, the dimension-reduction treatment unit is specifically used for:
Using principal component analytical method, dimension-reduction treatment is carried out to the standard feature data, obtains valid data.
In a specific embodiment provided by the invention, described device further includes:
Sample acquisition module, for obtaining sample pe file;
Sample characteristics extraction module, for extracting the sample characteristics data of the sample pe file;
Sample data processing module obtains sample valid data for handling the sample characteristics data;
Model building module is used for according to the sample valid data, using support vector machines ONECLASS model to institute It states sample valid data to be trained, establishes prediction model.
In a specific embodiment provided by the invention, described device further includes:
Probabilistic forecasting module, for being based on the prediction model, in advance when predicting the file to be detected is abnormal document The dangerous probability of the file to be detected is surveyed, and exports the dangerous probability to user.
More than, for a kind of device for detecting pe file abnormal behaviour provided by the invention.
It is corresponding based on inventive concept identical with a kind of above-mentioned detection method of pe file abnormal behaviour, this Inventive embodiments additionally provide a kind of computer readable storage medium, are stored thereon with computer program, and the program is by processor A kind of above-mentioned method for detecting pe file abnormal behaviour is realized when execution.
As shown from the above technical solution, computer readable storage medium provided in this embodiment, can be in the control of processor Under system, predict whether file to be detected is abnormal document, is able to use family and quickly understands whether file to be detected is abnormal literary Part can judge whether it is abnormal document before pe running paper, have foreseeability.The supporting vector that the present invention uses Machine ONECLASS model algorithm belongs to one kind of machine learning method, it is only necessary to collect normal pe file characteristic, and just for Normal data is modeled, and the ever-changing situation of hacker's behavior is able to solve, and 0-day attack can be recognized accurately.Pass through Examine whether pe file has abnormal behaviour using this method, the automaticity for having conventional method incomparable, timeliness, effectively The good advantages such as property.The present invention is the Outlier Detection Algorithm based on support vector machines ONECLASS model, is not necessarily to Virus Sample, only Normal pe sample need to be trained, can identify any virus except normal pe paper sample.
It is corresponding based on inventive concept identical with a kind of above-mentioned detection method of pe file abnormal behaviour, this Inventive embodiments additionally provide a kind of equipment for detecting pe file abnormal behaviour, including:Memory, processor and it is stored in storage On device and the computer program that can run on a processor, the processor realize a kind of above-mentioned detection pe when executing described program The method of file abnormal behaviour.
As shown from the above technical solution, a kind of equipment detecting pe file abnormal behaviour provided in this embodiment, by pre- Survey whether file to be detected is abnormal document, is able to use family and quickly understands whether file to be detected is abnormal document, in pe It can judge whether it is abnormal document before running paper, there is foreseeability.The support vector machines that the present invention uses ONECLASS model algorithm belongs to one kind of machine learning method, it is only necessary to collect normal pe file characteristic, and just for just Regular data is modeled, and the ever-changing situation of hacker's behavior is able to solve, and 0-day attack can be recognized accurately.By adopting Examine whether pe file has abnormal behaviour with this method, with the automaticity that conventional method is incomparable, timeliness, validity Etc. good advantage.The present invention is the Outlier Detection Algorithm based on support vector machines ONECLASS model, is not necessarily to Virus Sample, only needs Normal pe sample is trained, can identify any virus except normal pe paper sample.
In specification of the invention, numerous specific details are set forth.It is to be appreciated, however, that the embodiment of the present invention can be with It practices without these specific details.In some instances, well known method, structure and skill is not been shown in detail Art, so as not to obscure the understanding of this specification.
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show The description of example " or " some examples " etc. means specific features, structure, material or spy described in conjunction with this embodiment or example Point is included at least one embodiment or example of the invention.In the present specification, schematic expression of the above terms are not It must be directed to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described can be in office It can be combined in any suitable manner in one or more embodiment or examples.In addition, without conflicting with each other, the skill of this field Art personnel can tie the feature of different embodiments or examples described in this specification and different embodiments or examples It closes and combines.
Finally it should be noted that:The above embodiments are only used to illustrate the technical solution of the present invention., rather than its limitations;To the greatest extent Present invention has been described in detail with reference to the aforementioned embodiments for pipe, those skilled in the art should understand that:Its according to So be possible to modify the technical solutions described in the foregoing embodiments, or to some or all of the technical features into Row equivalent replacement;And these are modified or replaceed, various embodiments of the present invention technology that it does not separate the essence of the corresponding technical solution The range of scheme should all cover within the scope of the claims and the description of the invention.

Claims (8)

1. a kind of method for detecting pe file abnormal behaviour, which is characterized in that including:
Receive file to be detected;
Extract the characteristic of the file to be detected;
The characteristic is handled, valid data are obtained;
According to the valid data, based on the prediction model using support vector machines ONECLASS model training, prediction it is described to It detects whether file is abnormal document, obtains prediction result;
The prediction result is exported to user.
2. being obtained effective the method according to claim 1, wherein described handle the characteristic Data, including:
The characteristic is standardized, standard feature data are obtained;
Dimension-reduction treatment is carried out to the standard feature data, obtains valid data.
3. according to the method described in claim 2, it is characterized in that, it is described to the standard feature data carry out dimension-reduction treatment, Valid data are obtained, including:
Using principal component analytical method, dimension-reduction treatment is carried out to the standard feature data, obtains valid data.
4. the method according to claim 1, wherein according to the valid data, based on using supporting vector The prediction model of machine ONECLASS model training predicts whether the file to be detected is abnormal document, obtains prediction result Before step, further include:
Obtain sample pe file;
Extract the sample characteristics data of the sample pe file;
The sample characteristics data are handled, sample valid data are obtained;
According to the sample valid data, the sample valid data are instructed using support vector machines ONECLASS model Practice, establishes prediction model.
5. the method according to claim 1, wherein the method, further includes:
When predicting the file to be detected is abnormal document, it is based on the prediction model, predicts the danger of the file to be detected Dangerous probability, and the dangerous probability is exported to user.
6. a kind of device for detecting pe file abnormal behaviour, which is characterized in that including:
File reception module, for receiving file to be detected;
Characteristic extracting module, for extracting the characteristic of the file to be detected;
Data processing module obtains valid data for handling the characteristic;
Prediction module is used for according to the valid data, based on the prediction mould using support vector machines ONECLASS model training Type predicts whether the file to be detected is abnormal document, obtains prediction result;
Output module, for exporting the prediction result to user.
7. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is held by processor Method described in one of claim 1-5 is realized when row.
8. a kind of equipment for detecting pe file abnormal behaviour, including:Memory, processor and storage on a memory and can located The computer program run on reason device, which is characterized in that the processor realizes one of claim 1-5 when executing described program The method.
CN201810771640.0A 2018-07-13 2018-07-13 Detect method, apparatus, medium and the equipment of pe file abnormal behaviour Pending CN108920958A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810771640.0A CN108920958A (en) 2018-07-13 2018-07-13 Detect method, apparatus, medium and the equipment of pe file abnormal behaviour

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810771640.0A CN108920958A (en) 2018-07-13 2018-07-13 Detect method, apparatus, medium and the equipment of pe file abnormal behaviour

Publications (1)

Publication Number Publication Date
CN108920958A true CN108920958A (en) 2018-11-30

Family

ID=64411975

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810771640.0A Pending CN108920958A (en) 2018-07-13 2018-07-13 Detect method, apparatus, medium and the equipment of pe file abnormal behaviour

Country Status (1)

Country Link
CN (1) CN108920958A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110311898A (en) * 2019-06-13 2019-10-08 浙江工业大学 Network Computer Numerical Control System man-in-the-middle attack detection method based on Gaussian radial basis function classifier
CN112685735A (en) * 2018-12-27 2021-04-20 慧安金科(北京)科技有限公司 Method, apparatus, and computer-readable storage medium for detecting abnormal data
CN112948829A (en) * 2021-03-03 2021-06-11 深信服科技股份有限公司 File searching and killing method, system, equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105205396A (en) * 2015-10-15 2015-12-30 上海交通大学 Detecting system for Android malicious code based on deep learning and method thereof
CN107341401A (en) * 2017-06-21 2017-11-10 清华大学 A kind of malicious application monitoring method and equipment based on machine learning
CN107590388A (en) * 2017-09-12 2018-01-16 南方电网科学研究院有限责任公司 Malicious code detecting method and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105205396A (en) * 2015-10-15 2015-12-30 上海交通大学 Detecting system for Android malicious code based on deep learning and method thereof
CN107341401A (en) * 2017-06-21 2017-11-10 清华大学 A kind of malicious application monitoring method and equipment based on machine learning
CN107590388A (en) * 2017-09-12 2018-01-16 南方电网科学研究院有限责任公司 Malicious code detecting method and device

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112685735A (en) * 2018-12-27 2021-04-20 慧安金科(北京)科技有限公司 Method, apparatus, and computer-readable storage medium for detecting abnormal data
CN112685735B (en) * 2018-12-27 2024-04-12 慧安金科(北京)科技有限公司 Method, apparatus and computer readable storage medium for detecting abnormal data
CN110311898A (en) * 2019-06-13 2019-10-08 浙江工业大学 Network Computer Numerical Control System man-in-the-middle attack detection method based on Gaussian radial basis function classifier
CN110311898B (en) * 2019-06-13 2021-08-03 浙江工业大学 Man-in-the-middle attack detection method of networked numerical control system based on Gaussian radial basis function classifier
CN112948829A (en) * 2021-03-03 2021-06-11 深信服科技股份有限公司 File searching and killing method, system, equipment and storage medium
CN112948829B (en) * 2021-03-03 2023-11-03 深信服科技股份有限公司 File searching and killing method, system, equipment and storage medium

Similar Documents

Publication Publication Date Title
Venkatraman et al. A hybrid deep learning image-based analysis for effective malware detection
Shirani et al. B in a rm: Scalable and efficient detection of vulnerabilities in firmware images of intelligent electronic devices
CN101266550B (en) Malicious code detection method
CN110909811A (en) OCSVM (online charging management system) -based power grid abnormal behavior detection and analysis method and system
CN107451476A (en) Webpage back door detection method, system, equipment and storage medium based on cloud platform
Jeon et al. Hybrid malware detection based on bi-lstm and spp-net for smart iot
BR102015017215A2 (en) computer-implemented method for classifying mobile applications, and computer program encoded on non-transient storage medium
CN108920958A (en) Detect method, apparatus, medium and the equipment of pe file abnormal behaviour
CN109992969B (en) Malicious file detection method and device and detection platform
CN108491228A (en) A kind of binary vulnerability Code Clones detection method and system
CN112632535B (en) Attack detection method, attack detection device, electronic equipment and storage medium
RU2587429C2 (en) System and method for evaluation of reliability of categorisation rules
CN117034273A (en) Android malicious software detection method and system based on graph rolling network
Peng et al. Micro-architectural features for malware detection
CN108761250B (en) Industrial control equipment voltage and current-based intrusion detection method
CN114143074B (en) webshell attack recognition device and method
CN108509796B (en) Method for detecting risk and server
CN112367336B (en) Webshell interception detection method, device, equipment and readable storage medium
Jiang et al. Machine learning in industrial control system security: A survey
Wang Intrusion detection technology of Internet of vehicles based on deep learning
Sun et al. Vulnerability finding and firmware association in power grid
Lai et al. Research on Software Trust Analysis Based on Behavior
Zhao et al. Software abnormal behavior detection based on Hidden Markov Model
Suganya et al. Auditing of hadoop log file for dynamic detection of threats using H-ISSM-MIM and convolutional neural network
Singh et al. Static Malware Analysis Using Machine and Deep Learning

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20181130