Malicious program classification method and system for complex network
The embodiment of the invention provides a complex network malicious program-oriented classification method and system, and the method comprises the steps: obtaining the complete network flow of a network malicious program in a preset time, dividing the complete network flow into a plurality of netw...
Saved in:
Main Authors | , , , , , |
---|---|
Format | Patent |
Language | Chinese English |
Published |
12.01.2021
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | The embodiment of the invention provides a complex network malicious program-oriented classification method and system, and the method comprises the steps: obtaining the complete network flow of a network malicious program in a preset time, dividing the complete network flow into a plurality of network activities, carrying out the network activity description of the plurality of network activities, obtaining a network comprehensive behavior portrait model; generating a behavior signature from the sample network behavior characteristics obtained in the network comprehensive behavior portrait model through a behavior distance metric function and a preset clustering algorithm; and performing overall similarity calculation on the known malicious network training sample and the unknown test sample based on the behavior signature to obtain the category affiliation of the unknown network malicious program. According to the embodiment of the invention, the comprehensive behavior portrait classification is carried out |
---|---|
AbstractList | The embodiment of the invention provides a complex network malicious program-oriented classification method and system, and the method comprises the steps: obtaining the complete network flow of a network malicious program in a preset time, dividing the complete network flow into a plurality of network activities, carrying out the network activity description of the plurality of network activities, obtaining a network comprehensive behavior portrait model; generating a behavior signature from the sample network behavior characteristics obtained in the network comprehensive behavior portrait model through a behavior distance metric function and a preset clustering algorithm; and performing overall similarity calculation on the known malicious network training sample and the unknown test sample based on the behavior signature to obtain the category affiliation of the unknown network malicious program. According to the embodiment of the invention, the comprehensive behavior portrait classification is carried out |
Author | JIANG JIANGUO KANG XIAOYU HUANG WEIQING SHI ZHIXIN LYU BIN YIN QILEI |
Author_xml | – fullname: YIN QILEI – fullname: JIANG JIANGUO – fullname: KANG XIAOYU – fullname: SHI ZHIXIN – fullname: HUANG WEIQING – fullname: LYU BIN |
BookMark | eNqNyjsOwjAMANAMMPDpHcwBGFIqmKuKigUm9spKnRKRxFEcBNweBg7A9Ja3VLPIkRaqP6N3xvFDIGWeMgYwHkWcdQaL4wiByo1HwDiCvKVQAMsZDIfk6QWRypPzfa3mFr1Q9XOlNv3x2p22lHggSWjoO4fuonVd6-awb9rdP-cDnIo17w |
ContentType | Patent |
DBID | EVB |
DatabaseName | esp@cenet |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: EVB name: esp@cenet url: http://worldwide.espacenet.com/singleLineSearch?locale=en_EP sourceTypes: Open Access Repository |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Medicine Chemistry Sciences Physics |
DocumentTitleAlternate | 一种面向复杂网络恶意程序分类方法及系统 |
ExternalDocumentID | CN112214764A |
GroupedDBID | EVB |
ID | FETCH-epo_espacenet_CN112214764A3 |
IEDL.DBID | EVB |
IngestDate | Fri Jul 19 13:10:26 EDT 2024 |
IsOpenAccess | true |
IsPeerReviewed | false |
IsScholarly | false |
Language | Chinese English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-epo_espacenet_CN112214764A3 |
Notes | Application Number: CN202010935440 |
OpenAccessLink | https://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20210112&DB=EPODOC&CC=CN&NR=112214764A |
ParticipantIDs | epo_espacenet_CN112214764A |
PublicationCentury | 2000 |
PublicationDate | 20210112 |
PublicationDateYYYYMMDD | 2021-01-12 |
PublicationDate_xml | – month: 01 year: 2021 text: 20210112 day: 12 |
PublicationDecade | 2020 |
PublicationYear | 2021 |
RelatedCompanies | INSTITUTE OF INFORMATION ENGINEERING, CAS |
RelatedCompanies_xml | – name: INSTITUTE OF INFORMATION ENGINEERING, CAS |
Score | 3.4352136 |
Snippet | The embodiment of the invention provides a complex network malicious program-oriented classification method and system, and the method comprises the steps:... |
SourceID | epo |
SourceType | Open Access Repository |
SubjectTerms | CALCULATING COMPUTING COUNTING ELECTRIC COMMUNICATION TECHNIQUE ELECTRIC DIGITAL DATA PROCESSING ELECTRICITY HANDLING RECORD CARRIERS PHYSICS PRESENTATION OF DATA RECOGNITION OF DATA RECORD CARRIERS TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION |
Title | Malicious program classification method and system for complex network |
URI | https://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20210112&DB=EPODOC&locale=&CC=CN&NR=112214764A |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV3dS8MwED_m_HzTqej8IIL0rci6JHUPRVzaMoR2Q6bsbaxNyvShG7ai-Nd7STvni75eIFwOLve7yy93ANc06ciEu9SWWcZtynShSTnMpkq6PKMzt5foRDGK-eCJPkzYpAGvq78wpk_oh2mOiB6Vor-X5r5erotYvuFWFjfJC4oWd-HY8606O8b8BfGD5fe9YDT0h8ISwhOxFT96KNYTeTi934BNhNGu9obgua9_pSx_h5RwH7ZGuFteHkDja96CXbGavNaCnah-8G7BtmFopgUKay8sDiGMEDynmrxKanoVSTUI1qwfozup5kKTWS5J1aqZIDYlhj6uPkleUb-P4CoMxmJgo2rTHztMRbw-RfcYmvkiVydAuOvQbtqVkivMjjI2c1LFGMsku8Vw3pOn0P57n_Z_i2ewp22qKw4d5xya5du7usAYXCaXxnjfZ-aLzA |
link.rule.ids | 230,309,783,888,25576,76876 |
linkProvider | European Patent Office |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV3dT8IwEL8gfuCbokTxqyZmb4thtJ08LEY6FlQ2iEHDG2FrF_VhEJnR-Nd7LUN80ddr0lwvud7vrr_eAVzQuCFj7lJbpim3KdOFJuUwmyrp8pRO3FasE8Uw4t1HejdioxK8Lv_CmD6hH6Y5InpUgv6em_t6tipi-YZbOb-MX1A0vQ6Gnm8V2THmL4gfLL_tdQZ9vy8sITwRWdGDh2I9kYfTmzVYR4jtam_oPLX1r5TZ75AS7MDGAHfL8l0ofT1XoSKWk9eqsBUWD95V2DQMzWSOwsIL53sQhAieE01eJQW9iiQaBGvWj9GdLOZCk0kmyaJVM0FsSgx9XH2SbEH93ofzoDMUXRtVG__YYSyi1SmaNShn00wdAOGuQ5tJU0quMDtK2cRJFGMslewKw3lLHkL9733q_y2eQaU7DHvj3m10fwTb2r66-tBwjqGcv72rE4zHeXxqDPkNIuaOvw |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Apatent&rft.title=Malicious+program+classification+method+and+system+for+complex+network&rft.inventor=YIN+QILEI&rft.inventor=JIANG+JIANGUO&rft.inventor=KANG+XIAOYU&rft.inventor=SHI+ZHIXIN&rft.inventor=HUANG+WEIQING&rft.inventor=LYU+BIN&rft.date=2021-01-12&rft.externalDBID=A&rft.externalDocID=CN112214764A |