18390042. IDENTIFY MALICIOUS SOFTWARE simplified abstract (GOOGLE LLC)

From WikiPatents
Revision as of 06:26, 8 May 2024 by Wikipatents (talk | contribs) (Creating a new page)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

IDENTIFY MALICIOUS SOFTWARE

Organization Name

GOOGLE LLC

Inventor(s)

Richard Cannings of Santa Cruz CA (US)

Sai Deep Tetali of Mountain View CA (US)

Mo Yu of Mountain View CA (US)

Salvador Mandujano of San Jose CA (US)

IDENTIFY MALICIOUS SOFTWARE - A simplified explanation of the abstract

This abstract first appeared for US patent application 18390042 titled 'IDENTIFY MALICIOUS SOFTWARE

Simplified Explanation

The method described in the abstract involves using a feed-forward neural network to analyze the interactions of a software application with various uniform resource identifiers (URIs) in order to determine if the application is potentially harmful. By comparing the vector representation of the software application with those of a pool of training applications, similarity scores are generated to identify potential threats.

  • Identifying malicious software using neural network analysis:
   - Receive and execute software application
   - Identify URIs the application interacts with
   - Generate vector representation using neural network
   - Determine similarity scores with training applications
   - Flag potentially harmful applications based on similarity thresholds

Potential Applications

The technology can be applied in cybersecurity to detect and prevent the spread of malicious software, protecting systems and networks from potential threats.

Problems Solved

This technology addresses the challenge of identifying and categorizing potentially harmful software applications that may pose security risks to users and systems.

Benefits

- Enhanced cybersecurity measures - Early detection of malicious software - Improved protection against cyber threats

Potential Commercial Applications

- Cybersecurity companies - Software development firms - IT security departments

Possible Prior Art

One possible prior art in this field is the use of machine learning algorithms to detect malware and other security threats in software applications.

Unanswered Questions

How does the neural network handle new or previously unseen threats?

The abstract does not specify how the neural network adapts to new threats that may not be present in the pool of training applications.

What is the computational overhead of implementing this method in real-time systems?

The abstract does not provide information on the computational resources required to execute this method in real-time systems.


Original Abstract Submitted

A method for identifying malicious software includes receiving and executing a software application, identifying a plurality of uniform resource identifiers the software application interacts with during execution of the software application, and generating a vector representation for the software application using a feed-forward neural network configured to receive the plurality of uniform resource identifiers as feature inputs. The method also includes determining similarity scores for a pool of training applications, each similarity score associated with a corresponding training application and indicating a level of similarity between the vector representation for the software application and a respective vector representation for the corresponding training application. The method also includes flagging the software application as belonging to a potentially harmful application category when one or more of the training applications have similarity scores that satisfy a similarity threshold and include a potentially harmful application label.