首页> 外国专利> Malicious software clustering method expressed based on TLSH feature

Malicious software clustering method expressed based on TLSH feature

机译:基于TLSH特征的恶意软件聚类方法

摘要

This invention public a kind of malicious software clustering method expressed based on TLSH feature, which belongs to the analysis and test area of malicious software. Firstly, the Cuckoo Sandbox is used to analyze the malicious software to acquire three kinds of character string features, which are the static feature of the software, resource assess record during operation and API; And then the character strings are disassembled, filtered and sorted and the TLSH algorithm is used to compress them into three groups of feature values with size of 70 characters; Finally the OPTICS algorithm is utilized to realize the automatic classification on the malicious software family. This invention adopts unsupervised learning methods, which does not need the manual tab for the training in advance. The features which are extracted are compressed and expressed by using the TLSH. Under the situation that the feature is not lost, the data dimension is largely lowered and the clustering speed is improved; Through adoption of OPTICS clustering algorithm based on the density, it can not only recognize the cluster of any shape or any number but also largely reduce the influence of the input parameters on the clustering result while improving the efficiency and quality of clustering.
机译:本发明公开了一种基于TLSH特征表达的恶意软件聚类方法,属于恶意软件的分析测试领域。首先,使用杜鹃沙盒对恶意软件进行分析,以获取三种字符串特征,即软件的静态特征,运行过程中的资源评估记录和API。然后对字符串进行分解,过滤和排序,并使用TLSH算法将其压缩为三组具有70个字符的特征值。最后利用OPTICS算法对恶意软件家族进行自动分类。本发明采用无监督的学习方法,不需要预先的手动标签进行培训。提取的特征通过使用TLSH进行压缩和表示。在不丢失特征的情况下,数据维度大大降低,聚类速度提高;通过采用基于密度的OPTICS聚类算法,它不仅可以识别任何形状或任何数目的聚类,而且在提高聚类效率和质量的同时,大大降低了输入参数对聚类结果的影响。

著录项

相似文献

  • 专利
  • 外文文献
  • 中文文献
获取专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号