×

Method, apparatus and terminal for detecting a malware file

  • US 10,176,323 B2
  • Filed: 12/31/2015
  • Issued: 01/08/2019
  • Est. Priority Date: 06/30/2015
  • Status: Active Grant
First Claim
Patent Images

1. A method for detecting a malware file, comprising:

  • acquiring a file to be inspected;

    determining an information entropy vector of the file bydividing the file into a predetermined number of segments;

    obtaining an information entropy value for each of the segments; and

    setting the number of the segments as a dimension of the information entropy vector, wherein each of the segments corresponds to one direction of the information entropy vector, and the information entropy vector of the file is determined based on the information entropy value of each of the segments; and

    inspecting, using a trained inspection model, the determined information entropy vector of the file to ascertain whether the file is a malware file, wherein a file type of the file is identical to a model file type corresponding to the inspection model,wherein the inspection model is obtained by;

    acquiring a plurality of files with an identical file type and known security categories as training files, wherein the security categories include malware file categories and non-malware file categories;

    labeling the acquired training files with security category labels according to the known security categories;

    determining the information entropy vectors of the training files; and

    training and outputting the inspection model based on the determined information entropy vectors and the security category labels of the training files,the training and outputting the inspection model comprises;

    obtaining a subset of files from the training files as first files;

    performing a feature classification to the information entropy vectors of the first files, resulting in a classification outcome; and

    obtaining an initial inspection model by a learning operation based on the classification outcome and the security category labels of the first files;

    determining if a misjudgment rate of the initial inspection model is below a predetermined threshold value and outputting the initial inspection model as the trained inspection model when the misjudgment rate of the initial inspection model is below a predetermined threshold;

    if the misjudgment rate is not below the predetermined threshold value, repeating a step of generating a corrected inspection model by correcting the initial inspection model or a present corrected inspection model until the misjudgment rate of the corrected inspection model is below the predetermined threshold value; and

    stopping the repeating, and outputting the corrected inspection model as the trained inspection model when the misjudgment rate of the corrected inspection model is below the predetermined threshold value.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×