CN110554961A - abnormal software detection method and device, computer equipment and storage medium - Google Patents

abnormal software detection method and device, computer equipment and storage medium Download PDF

Info

Publication number
CN110554961A
CN110554961A CN201910759677.6A CN201910759677A CN110554961A CN 110554961 A CN110554961 A CN 110554961A CN 201910759677 A CN201910759677 A CN 201910759677A CN 110554961 A CN110554961 A CN 110554961A
Authority
CN
China
Prior art keywords
abnormal
software
detected
classifiers
attribute
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910759677.6A
Other languages
Chinese (zh)
Inventor
成卓鸿
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Puhui Enterprise Management Co Ltd
Original Assignee
Ping An Puhui Enterprise Management Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Puhui Enterprise Management Co Ltd filed Critical Ping An Puhui Enterprise Management Co Ltd
Priority to CN201910759677.6A priority Critical patent/CN110554961A/en
Publication of CN110554961A publication Critical patent/CN110554961A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3604Software analysis for verifying properties of programs

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The invention provides an abnormal software detection method, an abnormal software detection device, computer equipment and a storage medium, wherein the method comprises the following steps: respectively constructing corresponding classifiers according to various attribute information detected by software, and cascading the classifiers to form an abnormal recognition model; extracting target attribute information of software to be detected, inputting the target attribute information into an abnormal recognition model, and sequentially performing multi-stage recognition through classifiers at all stages; sequentially reading output results of classifiers of the abnormal recognition model at all levels, and calling an abnormal operation function to calculate an abnormal detection value; and when the abnormal detection value correspondingly calculated by any one stage of classifier reaches a set abnormal threshold value, stopping detection and judging the software to be detected as abnormal software. The method has the advantages that the multiple attribute information of the software to be detected is detected in sequence, when any attribute is detected to be abnormal, the detection can be stopped, the software to be detected is judged to be abnormal, and the detection efficiency is higher; the method and the device can detect various target attribute information of software more comprehensively and more accurately.

Description

abnormal software detection method and device, computer equipment and storage medium
Technical Field
The present invention relates to the field of computer technologies, and in particular, to an abnormal software detection method, an abnormal software detection apparatus, a computer device, and a storage medium.
Background
With the rapid development of internet technology and communication technology, operating systems have rapidly spread from the personal computer field to the mobile terminal field. In an operating system, some application software has strong aggressivity and intrusiveness, which may damage the operating system or steal privacy information of a user, and therefore, detection of abnormal software in the operating system is required.
At present, a detection method based on static characteristics is generally adopted for detection, namely whether application software is abnormal software is judged according to an abnormal authorization combination of the application software, all authorities of the software need to be detected, whether the software is abnormal is comprehensively judged after all the authorities are detected, the detection accuracy rate of the scheme is not high enough, and the efficiency is low.
Disclosure of Invention
the invention aims to solve at least one of the technical defects, particularly the technical defects that the detection accuracy of abnormal software is not high enough and the efficiency is low.
The invention provides an abnormal software detection method, which comprises the following steps:
Respectively constructing corresponding classifiers according to various attribute information detected by software, and cascading the classifiers to form an abnormal recognition model;
extracting target attribute information of software to be detected, inputting the target attribute information into the abnormal recognition model and sequentially performing multi-stage recognition through classifiers at all stages;
Sequentially reading output results of classifiers of the abnormal recognition model at all levels, and calling an abnormal operation function to calculate an abnormal detection value;
and when the abnormal detection value correspondingly calculated by the classifier at any stage reaches a set abnormal threshold value, stopping detection and judging the software to be detected as abnormal software.
in one embodiment, the step of respectively constructing corresponding classifiers according to the attribute information detected by the software includes:
Acquiring a first attribute set of a plurality of normal sample software detections and a second attribute set of a plurality of abnormal sample software detections;
selecting effective attributes from the first attribute set and the second attribute set;
And generating corresponding classifiers according to the attribute information of the effective attributes.
in one embodiment, the selecting the valid attribute from the first attribute set and the second attribute set includes:
Calculating a first support degree between each attribute and the first attribute set and a second support degree between each attribute and the second attribute set in the first attribute set and the second attribute set;
Calculating the difference between the first support degree and the second support degree to obtain a support degree difference value;
And when the support degree difference is larger than a preset difference, taking the corresponding attribute as the effective attribute.
In one embodiment, the step of cascading the classifiers to form an anomaly identification model includes:
sorting the corresponding classifiers according to the size of the support degree difference;
And cascading all the classifiers which are sequenced to form the anomaly identification model.
in one embodiment, the step of extracting the target attribute information of the software to be detected includes:
Acquiring initial attribute information of software to be detected;
And searching the target attribute information corresponding to the effective attribute from the initial attribute information.
in one embodiment, the step of calling the abnormal operation function to calculate the abnormal detection value includes:
Inquiring abnormal operation functions corresponding to the classifiers respectively;
And calling each abnormal operation function in sequence to operate each corresponding output result to obtain each abnormal detection value.
in one embodiment, before the steps of stopping detecting and determining that the software to be detected is abnormal software when the abnormal detection value correspondingly calculated by the classifier at any stage reaches the set abnormal threshold value, the method further includes:
and acquiring a set abnormal threshold corresponding to each classifier.
The invention also provides a computer device comprising a memory and a processor, wherein the memory stores computer readable instructions, and the computer readable instructions, when executed by the processor, cause the processor to execute the steps of the abnormal software detection method according to any embodiment.
The present invention also provides a storage medium having stored thereon computer-readable instructions which, when executed by one or more processors, cause the one or more processors to perform the steps of the method for detecting anomalous software in any of the embodiments.
according to the abnormal software detection method, the abnormal software detection device, the computer equipment and the storage medium, corresponding classifiers are respectively constructed according to various attribute information detected by software, and the classifiers are cascaded to form an abnormal recognition model; extracting target attribute information of software to be detected, inputting the target attribute information into the abnormal recognition model and sequentially performing multi-stage recognition through classifiers at all stages; sequentially reading output results of classifiers of the abnormal recognition model at all levels, and calling an abnormal operation function to calculate an abnormal detection value; and when the abnormal detection value correspondingly calculated by the classifier at any stage reaches a set abnormal threshold value, stopping detection and judging the software to be detected as abnormal software. The method has the advantages that the multiple attribute information of the software to be detected is detected in sequence, when any attribute is detected to be abnormal, the detection can be stopped, the software to be detected is judged to be abnormal, and the detection efficiency is higher; the method and the device can detect various target attribute information of software more comprehensively and more accurately.
Additional aspects and advantages of the invention will be set forth in part in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention.
drawings
the foregoing and/or additional aspects and advantages of the present invention will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
FIG. 1 is a diagram illustrating an exemplary application environment of the abnormal software detection method;
FIG. 2 is a flow diagram of a method for anomalous software detection in one embodiment;
FIG. 3 is a flow diagram of a method for anomalous software detection in one embodiment;
FIG. 4 is a flow chart of a method of detecting anomalous software in another embodiment;
FIG. 5 is a flowchart illustrating a method for detecting abnormal software in one embodiment;
FIG. 6 is a diagram illustrating an exemplary abnormal software detection apparatus;
FIG. 7 is a diagram showing an internal configuration of a computer device according to an embodiment.
Detailed Description
reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the drawings are illustrative only and should not be construed as limiting the invention.
As used herein, the singular forms "a", "an", "the" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms "comprises" and/or "comprising," when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It will be understood by those skilled in the art that, unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. It will be further understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the prior art and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein.
The abnormal software detection method provided by the application can be applied to the application environment shown in fig. 1. As shown in fig. 1, the server 104 respectively constructs corresponding classifiers according to various attribute information detected by the software, and concatenates the classifiers to form an anomaly identification model; the server 104 extracts target attribute information of the software to be detected from the terminal 102, inputs the target attribute information into the abnormal recognition model and sequentially carries out multi-stage recognition through classifiers at all stages; the server 104 sequentially reads the output results of the classifiers of the abnormal recognition model at all levels and calls an abnormal operation function to calculate an abnormal detection value; when the abnormal detection value correspondingly calculated by the classifier at any stage reaches the set abnormal threshold value, the server 104 stops recognizing and judges that the software to be detected of the terminal 102 is abnormal software.
Those skilled in the art will understand that the terminal used herein may be a Mobile phone, a tablet computer, a PDA (Personal Digital Assistant), an MID (Mobile Internet Device), etc.; the server may be implemented as a stand-alone server or as a server cluster consisting of a plurality of servers.
in one embodiment, as shown in fig. 2, an abnormal software detection method is provided, which is described by taking the application of the method to the server in fig. 1 as an example, and includes the following steps:
Step S201, respectively constructing corresponding classifiers according to various attribute information detected by software, and cascading the classifiers to form an anomaly identification model.
The various attributes detected by the software may include attributes such as identity authentication, authorization, confidentiality, availability, integrity and the like; but may also refer to various ones of the application rights individually.
in the specific implementation process, classifiers corresponding to the attribute information are respectively constructed, then the classifiers are cascaded according to a preset sequence to form an abnormality identification model, and abnormality detection is carried out on the attributes according to the abnormality identification model; the method and the device can detect various target attribute information of software more comprehensively and more accurately.
Taking three attributes of identity authentication, authorization and confidentiality as examples for explanation, respectively constructing three classifiers, respectively corresponding to the identity authentication, the authorization and the confidentiality, acquiring the target identity authentication, the target authorization and the target confidentiality of the software to be detected, and sequentially inputting the target identity authentication, the target authorization and the target confidentiality into the corresponding classifiers for anomaly detection.
In one embodiment, the step S201 of respectively constructing corresponding classifiers according to the attribute information detected by the software includes:
A1, acquiring a first attribute set of a plurality of normal sample software detections, and acquiring a second attribute set of a plurality of abnormal sample software detections.
The normal sample software refers to software with normal attributes after detection, and the abnormal sample software refers to sample software which is judged to be abnormal software after detection.
A2, selecting effective attributes from the first attribute set and the second attribute set.
The specific steps for selecting the effective attributes are as follows:
(1) Calculating a first support degree between each attribute and the first attribute set and a second support degree between each attribute and the second attribute set in the first attribute set and the second attribute set;
Specifically, the first support degree represents a degree of correlation between the attribute and the first attribute set, and the second support degree represents a degree of correlation between the attribute and the second attribute set.
(2) calculating the difference between the first support degree and the second support degree to obtain a support degree difference value;
(3) and when the support degree difference is larger than a preset difference, taking the corresponding attribute as the effective attribute.
it can be understood that the larger the support degree difference is, the more obvious the attribute is to distinguish between the normal sample software and the abnormal sample software, and the attribute is more valuable to be determined, so that when the support degree difference is larger than the preset difference, the attribute is determined to be the valid attribute.
A3, generating each corresponding classifier according to the attribute information of each effective attribute.
in the embodiment, the effective attributes are obtained by screening the software detection attributes by judging the difference degree of each attribute between the normal sample software and the abnormal sample software, and the corresponding classifier is constructed according to the attribute information of the effective attributes, so that the target attribute information corresponding to the effective attributes in all the attribute information of the software to be detected is detected, and the detection efficiency can be effectively improved.
In one embodiment, the step S201 of cascading the classifiers to form the anomaly identification model includes:
and B1, sorting the corresponding classifiers according to the size of the support degree difference.
The greater the support degree difference value is, the more obvious the attribute is to distinguish between the normal sample software and the abnormal sample software is shown, the more judgment value is shown for the attribute, and the importance degree is relatively higher, so that the corresponding classifiers can be sorted according to the support degree difference value of each effective attribute, and the classifiers corresponding to the important effective attributes can be arranged at the positions closer to the front, so as to more quickly detect the software abnormality.
And B2, cascading the sorted classifiers to form the anomaly identification model.
in the embodiment, corresponding classifiers are sorted according to the support degree difference of each effective attribute, and then the sorted classifiers are cascaded to form an abnormality identification model, so that whether software is abnormal can be detected more quickly; (ii) a The method and the device can detect various target attribute information of software more comprehensively and more accurately.
And S202, extracting target attribute information of the software to be detected, inputting the target attribute information into the abnormal recognition model, and sequentially performing multi-stage recognition through classifiers at different stages.
The target attribute information is attribute information of effective attributes of the software to be detected.
In the specific implementation process, the attribute information of the effective attribute of the software to be detected is sequentially input into the classifiers corresponding to the effective attribute according to the importance degree of each classifier to carry out multi-level identification.
As shown in fig. 3, in an embodiment, the extracting of the target attribute information of the software to be detected in step S202 includes:
Step S210, acquiring initial attribute information of the software to be detected.
step S220, searching the target attribute information corresponding to the effective attribute from the initial attribute information.
because some attribute information in the software to be detected is not high in reference value for judging whether the software to be detected is abnormal software, the target attribute information corresponding to the effective attribute is searched from the initial attribute information, and whether the software to be detected is abnormal software is judged according to the target attribute information.
And step S203, sequentially reading output results of each stage of classifiers of the abnormal recognition model, and calling an abnormal operation function to calculate an abnormal detection value.
Specifically, the abnormal operation functions corresponding to each stage of classifier may be the same, or multiple abnormal operation functions may be set, and each abnormal operation function corresponds to each classifier.
as shown in fig. 4, in one embodiment, the step of calling the abnormal operation function in step S203 to calculate the abnormal detection value includes:
Step S310, querying an abnormal operation function corresponding to each classifier.
It can be understood that, since the attribute information detected by each classifier is different, the corresponding abnormal operation function is different.
Specifically, a plurality of abnormal operation functions are prestored in the server, each abnormal operation function is provided with a corresponding effective attribute, and the abnormal operation function corresponding to the effective attribute can be obtained only by querying the effective attribute corresponding to each classifier.
Step S320, sequentially calling each abnormal operation function to operate each corresponding output result, so as to obtain each abnormal detection value.
in this embodiment, the abnormal operation function corresponding to the valid attribute is queried according to the valid attribute corresponding to the classifier, and each time one valid attribute is detected, the output result is operated according to the corresponding abnormal operation function, and each target attribute is detected in sequence according to the importance degree of the valid attribute.
and step S204, when the abnormal detection value correspondingly calculated by the classifier at any stage reaches a set abnormal threshold value, stopping detection and judging the software to be detected as abnormal software.
in the specific implementation process, the importance degree of the effective attributes is detected for each target according to each classifier in sequence, and when the output result corresponding to a certain target attribute is found to be abnormal, the software to be detected is judged to be abnormal software.
It should be noted that, when an output result corresponding to a certain target attribute is abnormal, detection may be stopped and the software to be detected is determined to be abnormal software, and detection of other subsequent target attributes is not required, because the importance degree of the target attribute information in the detection sequence is higher, when the more important target attribute information is detected to be abnormal, it is not required to detect the target attribute information with a relatively lower importance degree again.
For example, assuming that there are three classifiers, the corresponding valid attributes are authentication, authorization and confidentiality, and the authentication, authorization and confidentiality of the software to be detected are sequentially detected according to the different classifiers, and when the detection result of the authorization attribute is abnormal, the remaining confidentiality attribute does not need to be detected any more, because the importance degree of the authorization attribute is greater than that of the confidentiality attribute, the detection can improve the software detection speed.
Specifically, the set abnormal threshold corresponding to the multi-stage classifier may be the same, or a plurality of set abnormal thresholds may be provided, and each set abnormal threshold corresponds to each classifier.
In one embodiment, the step S204, before stopping detecting and determining that the software to be detected is abnormal software when the abnormal detection value correspondingly calculated by the any one-stage classifier reaches the set abnormal threshold value, further includes: and acquiring a set abnormal threshold corresponding to each classifier.
Further, each time the abnormality detection of the first-stage classifier is performed, it is necessary to determine whether the output result of the classifier reaches a set abnormality threshold, the effective attributes corresponding to different classifiers are inconsistent, and the set abnormality thresholds corresponding to different effective attributes may be set to be different, so that the set abnormality thresholds corresponding to the classifiers need to be obtained first.
In the specific implementation process, a plurality of set abnormal threshold values are prestored in the server, and each set abnormal threshold value is provided with a corresponding effective attribute, so that the set abnormal threshold value corresponding to the effective attribute can be obtained only by inquiring the effective attribute corresponding to each classifier.
The abnormal software detection method is further explained with reference to fig. 5, the target attribute information of the software to be detected is extracted and sequentially input into an abnormal detection model formed by cascade connection of a plurality of classifiers, each stage of classifier is input, a corresponding abnormal operation function is modified and called to operate, the detection result of each stage of classifier is compared with a set abnormal threshold value, when the operation result corresponding to a certain stage of classifier reaches a corresponding abnormal detection value, the detection is stopped, the target attribute information does not need to be input into the next stage of classifier to operate, and the software to be detected is judged to be abnormal software.
For a better understanding of the above method, an example of the application of the anomaly software detection of the present invention is described in detail below:
1) Acquiring a plurality of normal sample software and a plurality of abnormal sample software, and selecting effective attributes from the attribute information of the plurality of normal sample software and the plurality of abnormal sample software;
2) Selecting the obtained effective attributes as authentication and authorization, sequencing the two attributes according to the support difference of the effective attributes, and sequentially decreasing the importance degree as the authentication and the authentication;
3) Sequentially cascading classifiers corresponding to authorization and identity verification to form an abnormal recognition model;
4) extracting target attribute information corresponding to authorization and identity verification from initial attribute information of software to be detected;
5) Inputting target attribute information corresponding to the authorization into a classifier corresponding to the authorization, and judging whether a first output result reaches a first set abnormal threshold value;
6) And if the first output result does not reach the first set abnormal threshold, inputting the target attribute information corresponding to the identity authentication into a classifier corresponding to the identity authentication, and judging whether the second output result reaches a second set abnormal threshold.
in the abnormal software detection method, corresponding classifiers are respectively constructed according to various attribute information detected by software, and the classifiers are cascaded to form an abnormal recognition model; extracting target attribute information of software to be detected, inputting the target attribute information into the abnormal recognition model and sequentially performing multi-stage recognition through classifiers at all stages; sequentially reading output results of classifiers of the abnormal recognition model at all levels, and calling an abnormal operation function to calculate an abnormal detection value; and when the abnormal detection value correspondingly calculated by the classifier at any stage reaches a set abnormal threshold value, stopping detection and judging the software to be detected as abnormal software. The method has the advantages that the multiple attribute information of the software to be detected is detected in sequence, when any attribute is detected to be abnormal, the detection can be stopped, the software to be detected is judged to be abnormal, and the detection efficiency is higher; the method and the device can detect various target attribute information of software more comprehensively and more accurately.
as shown in fig. 6, fig. 6 is a schematic structural diagram of an abnormal software detection apparatus in an embodiment, and the abnormal software detection apparatus provided in this embodiment includes an identification model building module 601, a multi-stage identification module 602, an abnormal operation module 603, and an abnormal determination module 604, where:
The identification model construction module 601 is used for respectively constructing corresponding classifiers according to various attribute information detected by software, and cascading the classifiers to form an abnormal identification model;
The multi-stage identification module 602 is configured to extract target attribute information of software to be detected, input the target attribute information into the anomaly identification model, and sequentially perform multi-stage identification through each stage of classifier;
an anomaly operation module 603, configured to sequentially read output results of each stage of classifiers of the anomaly identification model, and call an anomaly operation function to calculate an anomaly detection value;
And an anomaly determination module 604, configured to stop detection and determine that the software to be detected is abnormal software when an anomaly detection value correspondingly calculated by the any one-stage classifier reaches a set anomaly threshold value.
for the specific definition of the abnormal software detection device, the above definition of the abnormal software detection method can be referred to, and is not described herein again. The modules in the abnormal software detection device can be wholly or partially realized by software, hardware and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
Fig. 7 is a schematic diagram of an internal structure of a computer device according to an embodiment, as shown in fig. 7. The computer apparatus includes a processor, a non-volatile storage medium, a memory, and a network interface connected by a device bus. The non-volatile storage medium of the computer device stores an operating device, a database and computer readable instructions, the database can store control information sequences, and the computer readable instructions can enable the processor to realize an abnormal software detection method when being executed by the processor. The processor of the computer device is used for providing calculation and control capability and supporting the operation of the whole computer device. The memory of the computer device may have stored therein computer readable instructions that, when executed by the processor, may cause the processor to perform a method of anomalous software detection. The network interface of the computer device is used for connecting and communicating with the terminal. Those skilled in the art will appreciate that the architecture shown in fig. 7 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
in one embodiment, a computer device is provided, the computer device comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor implementing the following steps when executing the computer program: respectively constructing corresponding classifiers according to various attribute information detected by software, and cascading the classifiers to form an abnormal recognition model; extracting target attribute information of software to be detected, inputting the target attribute information into the abnormal recognition model and sequentially performing multi-stage recognition through classifiers at all stages; sequentially reading output results of classifiers of the abnormal recognition model at all levels, and calling an abnormal operation function to calculate an abnormal detection value; and when the abnormal detection value correspondingly calculated by the classifier at any stage reaches a set abnormal threshold value, stopping detection and judging the software to be detected as abnormal software.
In one embodiment, the step of constructing corresponding classifiers according to the attribute information detected by the software when the processor executes the computer program includes: acquiring a first attribute set of a plurality of normal sample software detections and a second attribute set of a plurality of abnormal sample software detections; selecting effective attributes from the first attribute set and the second attribute set; and generating corresponding classifiers according to the attribute information of the effective attributes.
In one embodiment, the step of selecting valid attributes from the first set of attributes and the second set of attributes when the processor executes the computer program comprises: calculating a first support degree between each attribute and the first attribute set and a second support degree between each attribute and the second attribute set in the first attribute set and the second attribute set; calculating the difference between the first support degree and the second support degree to obtain a support degree difference value; and when the support degree difference is larger than a preset difference, taking the corresponding attribute as the effective attribute.
In one embodiment, the step of cascading the classifiers to form the anomaly identification model when the processor executes the computer program comprises: sorting the corresponding classifiers according to the size of the support degree difference; and cascading all the classifiers which are sequenced to form the anomaly identification model.
in one embodiment, the step of extracting the target attribute information of the software to be detected when the processor executes the computer program includes: acquiring initial attribute information of software to be detected; and searching the target attribute information corresponding to the effective attribute from the initial attribute information.
in one embodiment, the step of calling the abnormal operation function to calculate the abnormal detection value when the processor executes the computer program includes: inquiring abnormal operation functions corresponding to the classifiers respectively; and calling each abnormal operation function in sequence to operate each corresponding output result to obtain each abnormal detection value.
in one embodiment, before the steps of stopping detecting and determining that the software to be detected is abnormal software when the processor executes the computer program and the abnormal detection value correspondingly calculated by the arbitrary one-stage classifier reaches the set abnormal threshold value, the method further includes: and acquiring a set abnormal threshold corresponding to each classifier.
In one embodiment, a storage medium is provided that stores computer-readable instructions that, when executed by one or more processors, cause the one or more processors to perform the steps of: respectively constructing corresponding classifiers according to various attribute information detected by software, and cascading the classifiers to form an abnormal recognition model; extracting target attribute information of software to be detected, inputting the target attribute information into the abnormal recognition model and sequentially performing multi-stage recognition through classifiers at all stages; sequentially reading output results of classifiers of the abnormal recognition model at all levels, and calling an abnormal operation function to calculate an abnormal detection value; and when the abnormal detection value correspondingly calculated by the classifier at any stage reaches a set abnormal threshold value, stopping detection and judging the software to be detected as abnormal software.
in one embodiment, the step of constructing corresponding classifiers according to the attribute information detected by the software when the computer readable instructions are executed by the processor comprises: acquiring a first attribute set of a plurality of normal sample software detections and a second attribute set of a plurality of abnormal sample software detections; selecting effective attributes from the first attribute set and the second attribute set; and generating corresponding classifiers according to the attribute information of the effective attributes.
In one embodiment, the step of selecting valid attributes from the first set of attributes and the second set of attributes when executed by a processor comprises: calculating a first support degree between each attribute and the first attribute set and a second support degree between each attribute and the second attribute set in the first attribute set and the second attribute set; calculating the difference between the first support degree and the second support degree to obtain a support degree difference value; and when the support degree difference is larger than a preset difference, taking the corresponding attribute as the effective attribute.
In one embodiment, the step of cascading the classifiers into an anomaly recognition model when executed by the processor comprises: sorting the corresponding classifiers according to the size of the support degree difference; and cascading all the classifiers which are sequenced to form the anomaly identification model.
In one embodiment, the step of extracting target attribute information of the software to be detected when the computer readable instructions are executed by the processor includes: acquiring initial attribute information of software to be detected; and searching the target attribute information corresponding to the effective attribute from the initial attribute information.
In one embodiment, the step of calling an abnormal operation function to calculate an abnormal detection value when the computer readable instructions are executed by the processor comprises: inquiring abnormal operation functions corresponding to the classifiers respectively; and calling each abnormal operation function in sequence to operate each corresponding output result to obtain each abnormal detection value.
in one embodiment, before the steps of stopping detecting and determining that the software to be detected is abnormal software when the abnormal detection value correspondingly calculated by the arbitrary level classifier reaches the set abnormal threshold value when the computer readable instructions are executed by the processor, the method further includes: and acquiring a set abnormal threshold corresponding to each classifier.
It should be understood that, although the steps in the flowcharts of the figures are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and may be performed in other orders unless explicitly stated herein. Moreover, at least a portion of the steps in the flow chart of the figure may include multiple sub-steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, which are not necessarily performed in sequence, but may be performed alternately or alternately with other steps or at least a portion of the sub-steps or stages of other steps.
The foregoing is only a partial embodiment of the present invention, and it should be noted that, for those skilled in the art, various modifications and decorations can be made without departing from the principle of the present invention, and these modifications and decorations should also be regarded as the protection scope of the present invention.

Claims (10)

1. An abnormal software detection method is characterized by comprising the following steps:
respectively constructing corresponding classifiers according to various attribute information detected by software, and cascading the classifiers to form an abnormal recognition model;
extracting target attribute information of software to be detected, inputting the target attribute information into the abnormal recognition model and sequentially performing multi-stage recognition through classifiers at all stages;
Sequentially reading output results of classifiers of the abnormal recognition model at all levels, and calling an abnormal operation function to calculate an abnormal detection value;
and when the abnormal detection value correspondingly calculated by the classifier at any stage reaches a set abnormal threshold value, stopping detection and judging the software to be detected as abnormal software.
2. The method according to claim 1, wherein the step of constructing corresponding classifiers according to the attribute information detected by the software respectively comprises:
acquiring a first attribute set of a plurality of normal sample software detections and a second attribute set of a plurality of abnormal sample software detections;
selecting effective attributes from the first attribute set and the second attribute set;
and generating corresponding classifiers according to the attribute information of the effective attributes.
3. the method of claim 2, wherein the step of selecting the valid attribute from the first set of attributes and the second set of attributes comprises:
Calculating a first support degree between each attribute and the first attribute set and a second support degree between each attribute and the second attribute set in the first attribute set and the second attribute set;
calculating the difference between the first support degree and the second support degree to obtain a support degree difference value;
And when the support degree difference is larger than a preset difference, taking the corresponding attribute as the effective attribute.
4. the method of claim 3, wherein the step of cascading the classifiers to form an anomaly recognition model comprises:
Sorting the corresponding classifiers according to the size of the support degree difference;
And cascading all the classifiers which are sequenced to form the anomaly identification model.
5. the method according to claim 2, wherein the step of extracting the target attribute information of the software to be detected comprises:
Acquiring initial attribute information of software to be detected;
And searching the target attribute information corresponding to the effective attribute from the initial attribute information.
6. the method of claim 1, wherein the step of calling the abnormal operation function to calculate the abnormal detection value comprises:
inquiring abnormal operation functions corresponding to the classifiers respectively;
And calling each abnormal operation function in sequence to operate each corresponding output result to obtain each abnormal detection value.
7. The method according to claim 1, wherein before the steps of stopping detecting and determining that the software to be detected is abnormal software when the abnormal detection value correspondingly calculated by the classifier at any stage reaches the set abnormal threshold value, the method further comprises:
And acquiring a set abnormal threshold corresponding to each classifier.
8. an abnormal software detecting apparatus, comprising:
the identification model construction module is used for respectively constructing corresponding classifiers according to various attribute information detected by software and cascading the classifiers to form an abnormal identification model;
The multi-stage identification module is used for extracting target attribute information of the software to be detected, inputting the target attribute information into the abnormal identification model and sequentially carrying out multi-stage identification through each stage of classifier;
The abnormal operation module is used for sequentially reading output results of all levels of classifiers of the abnormal recognition model and calling an abnormal operation function to calculate an abnormal detection value;
and the abnormality judgment module is used for stopping detection and judging the software to be detected as abnormal software when the abnormal detection value correspondingly calculated by the classifier at any stage reaches a set abnormal threshold value.
9. a computer device comprising a memory and a processor, the memory having stored therein computer readable instructions, wherein the computer readable instructions, when executed by the processor, cause the processor to perform the steps of the abnormal software detection method according to any one of claims 1 to 7.
10. A storage medium having computer-readable instructions stored thereon which, when executed by one or more processors, cause the one or more processors to perform the steps of the anomalous software detection method as in any one of claims 1 to 7.
CN201910759677.6A 2019-08-16 2019-08-16 abnormal software detection method and device, computer equipment and storage medium Pending CN110554961A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910759677.6A CN110554961A (en) 2019-08-16 2019-08-16 abnormal software detection method and device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910759677.6A CN110554961A (en) 2019-08-16 2019-08-16 abnormal software detection method and device, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN110554961A true CN110554961A (en) 2019-12-10

Family

ID=68737725

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910759677.6A Pending CN110554961A (en) 2019-08-16 2019-08-16 abnormal software detection method and device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN110554961A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111340502A (en) * 2020-02-24 2020-06-26 中国银联股份有限公司 Abnormal behavior identification method and device, terminal equipment and storage medium
CN113361451A (en) * 2021-06-24 2021-09-07 福建万福信息技术有限公司 Ecological environment target identification method based on multi-level model and preset point automatic adjustment
CN115348139A (en) * 2022-07-18 2022-11-15 中国人民解放军国防科技大学 Modulation identification method based on cascade characteristic fusion and multi-level classification
CN115766554A (en) * 2022-11-07 2023-03-07 深圳复临科技有限公司 Software detection method and device, computer equipment and storage medium
CN117056152A (en) * 2023-10-13 2023-11-14 腾讯科技(深圳)有限公司 Equipment detection method and related device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105335684A (en) * 2014-06-25 2016-02-17 小米科技有限责任公司 Face detection method and device
US20160335432A1 (en) * 2015-05-17 2016-11-17 Bitdefender IPR Management Ltd. Cascading Classifiers For Computer Security Applications
CN107180190A (en) * 2016-03-11 2017-09-19 深圳先进技术研究院 A kind of Android malware detection method and system based on composite character

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105335684A (en) * 2014-06-25 2016-02-17 小米科技有限责任公司 Face detection method and device
US20160335432A1 (en) * 2015-05-17 2016-11-17 Bitdefender IPR Management Ltd. Cascading Classifiers For Computer Security Applications
CN107180190A (en) * 2016-03-11 2017-09-19 深圳先进技术研究院 A kind of Android malware detection method and system based on composite character

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
王星: "安卓应用程序若干典型特征刻画及其恶意行为检测方法", 中国博士学位论文全文数据库信息科技辑, no. 2019, 15 January 2019 (2019-01-15), pages 138 - 19 *

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111340502A (en) * 2020-02-24 2020-06-26 中国银联股份有限公司 Abnormal behavior identification method and device, terminal equipment and storage medium
CN111340502B (en) * 2020-02-24 2024-07-16 中国银联股份有限公司 Abnormal behavior identification method and device, terminal equipment and storage medium
CN113361451A (en) * 2021-06-24 2021-09-07 福建万福信息技术有限公司 Ecological environment target identification method based on multi-level model and preset point automatic adjustment
CN113361451B (en) * 2021-06-24 2024-04-30 福建万福信息技术有限公司 Ecological environment target identification method based on multistage model and preset point automatic adjustment
CN115348139A (en) * 2022-07-18 2022-11-15 中国人民解放军国防科技大学 Modulation identification method based on cascade characteristic fusion and multi-level classification
CN115348139B (en) * 2022-07-18 2024-01-05 中国人民解放军国防科技大学 Modulation identification method based on cascade feature fusion and multi-stage classification
CN115766554A (en) * 2022-11-07 2023-03-07 深圳复临科技有限公司 Software detection method and device, computer equipment and storage medium
CN117056152A (en) * 2023-10-13 2023-11-14 腾讯科技(深圳)有限公司 Equipment detection method and related device
CN117056152B (en) * 2023-10-13 2024-02-09 腾讯科技(深圳)有限公司 Equipment detection method and related device

Similar Documents

Publication Publication Date Title
CN110554961A (en) abnormal software detection method and device, computer equipment and storage medium
CN110177108B (en) Abnormal behavior detection method, device and verification system
CN106503558B (en) A kind of Android malicious code detecting method based on community structure analysis
US10963551B2 (en) Method and apparatus for user authentication based on feature information
US8332944B2 (en) System and method for detecting new malicious executables, based on discovering and monitoring characteristic system call sequences
CN101593253B (en) Method and device for judging malicious programs
KR20170108330A (en) Apparatus and method for detecting malware code
CN108985057B (en) Webshell detection method and related equipment
CN104933352A (en) Weak password detection method and device
CN113422763B (en) Alarm correlation analysis method constructed based on attack scene
CN109191021B (en) Association rule matching method and device for power grid abnormal event
CN111813845A (en) ETL task-based incremental data extraction method, device, equipment and medium
CN111339531A (en) Malicious code detection method and device, storage medium and electronic equipment
Naik et al. Fuzzy-Import Hashing: A malware analysis approach
CN105243327B (en) A kind of secure file processing method
CN105468972B (en) A kind of mobile terminal document detection method
CN112464297B (en) Hardware Trojan detection method, device and storage medium
CN108509796B (en) Method for detecting risk and server
CN113378161A (en) Security detection method, device, equipment and storage medium
CN113452700A (en) Method, device, equipment and storage medium for processing safety information
CN108650249B (en) POC attack detection method and device, computer equipment and storage medium
CN116232656A (en) Internet of vehicles intrusion detection model training method, detection method and equipment based on generation of countermeasure network
CN115659354A (en) Method and device for detecting multi-granularity vulnerability similarity of power system Internet of things firmware
CN107832609B (en) Android malicious software detection method and system based on authority characteristics
CN117896186B (en) Vulnerability scanning method, system and storage medium based on log analysis

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination