首页> 外国专利> IDENTIFYING MALICIOUS ACTIVITY USING DATA COMPLEXITY ANOMALIES

IDENTIFYING MALICIOUS ACTIVITY USING DATA COMPLEXITY ANOMALIES

机译:使用数据复杂性异常识别恶意活动

摘要

Examples relate to identifying malicious activity using data complexity anomalies. In one example, a computing device may: receive a byte stream that includes a plurality of bytes; determine, for a least one subset of the byte stream, a measure of complexity of the subset; determine that the measure of complexity meets a predetermined threshold measure of complexity for a context associated with the byte stream; and in response to determining that the measure of complexity meets the threshold, provide an indication that the byte stream complexity is anomalous.
机译:示例涉及使用数据复杂性异常来识别恶意活动。在一个示例中,计算设备可以:接收包括多个字节的字节流;对于字节流的至少一个子集,确定该子集的复杂度的量度;确定复杂度的度量满足与字节流相关联的上下文的复杂度的预定阈值度量;并响应于确定复杂性的度量满足阈值,提供字节流复杂性异常的指示。

著录项

相似文献

  • 专利
  • 外文文献
  • 中文文献
获取专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号