18552128. DETECTION OF MALICIOUS BEHAVIOR OF APPLET simplified abstract (Alipay (Hangzhou) Information Technology Co., Ltd.)
Contents
- 1 DETECTION OF MALICIOUS BEHAVIOR OF APPLET
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 DETECTION OF MALICIOUS BEHAVIOR OF APPLET - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Potential Applications
- 1.6 Problems Solved
- 1.7 Benefits
- 1.8 Potential Commercial Applications
- 1.9 Possible Prior Art
- 1.10 How does this technology handle false positives in detecting malicious behavior?
- 1.11 What is the computational overhead of implementing this method for detecting malicious behavior?
- 1.12 Original Abstract Submitted
DETECTION OF MALICIOUS BEHAVIOR OF APPLET
Organization Name
Alipay (Hangzhou) Information Technology Co., Ltd.
Inventor(s)
DETECTION OF MALICIOUS BEHAVIOR OF APPLET - A simplified explanation of the abstract
This abstract first appeared for US patent application 18552128 titled 'DETECTION OF MALICIOUS BEHAVIOR OF APPLET
Simplified Explanation
The patent application describes a method for detecting malicious behavior in an applet by analyzing behavior records generated during its execution.
- Behavior records are generated through triggering during the running of the applet.
- Behavior features are extracted from each behavior record.
- Feature combinations are formed using behavior features from multiple behavior records.
- The method determines if there is a feature combination that includes a predetermined feature combination of a malicious behavior record.
- If such a feature combination is found, the applet is identified as conducting malicious behavior.
Potential Applications
The technology described in this patent application could be used in cybersecurity systems to detect and prevent malicious behavior in applets and other software applications.
Problems Solved
This technology addresses the issue of identifying and stopping malicious behavior in applets, which can help protect users from security threats and prevent damage to systems.
Benefits
The benefits of this technology include enhanced security for applets, improved detection of malicious behavior, and increased protection against cyber threats.
Potential Commercial Applications
One potential commercial application of this technology could be in antivirus software or security suites that offer protection against malware and other malicious software.
Possible Prior Art
One possible prior art for this technology could be existing methods for behavior analysis and anomaly detection in software applications.
Unanswered Questions
How does this technology handle false positives in detecting malicious behavior?
The patent application does not provide information on how false positives in detecting malicious behavior are addressed. This could be an important consideration for the practical implementation of this technology.
What is the computational overhead of implementing this method for detecting malicious behavior?
The patent application does not discuss the computational resources required to implement this method for detecting malicious behavior. Understanding the computational overhead could be crucial for assessing the feasibility of deploying this technology in real-world applications.
Original Abstract Submitted
The specification provides a method for at least two behavior records that are generated through triggering during running of the applet are obtained; then, a behavior feature of each behavior record is extracted; next, at least one feature combination is formed by using at least two behavior features of at least two successively generated behavior records, where each feature combination includes at least two behavior features, and a sequence of the at least two behavior features in the feature combination is the same as a time sequence of generating behavior records corresponding to the at least two behavior features; and finally, it is determined whether there is a feature combination that includes a predetermined feature combination of a malicious behavior record; and if there is a feature combination that includes the predetermined feature combination of a malicious behavior record, it is determined that the applet conducts a malicious behavior.