首页>
外国专利>
Identifying malicious activity using data complexity anomalies
Identifying malicious activity using data complexity anomalies
展开▼
机译:使用数据复杂性异常识别恶意活动
展开▼
页面导航
摘要
著录项
相似文献
摘要
Examples relate to identifying malicious activity using data complexity anomalies. In one example, a computing device may: receive a byte stream that includes a plurality of bytes; determine, for a least one subset of the byte stream, a measure of complexity of the subset; determine that the measure of complexity meets a predetermined threshold measure of complexity for a context associated with the byte stream; and in response to determining that the measure of complexity meets the threshold, provide an indication that the byte stream complexity is anomalous.
展开▼