18552128. DETECTION OF MALICIOUS BEHAVIOR OF APPLET simplified abstract (Alipay (Hangzhou) Information Technology Co., Ltd.)

From WikiPatents
Jump to navigation Jump to search

DETECTION OF MALICIOUS BEHAVIOR OF APPLET

Organization Name

Alipay (Hangzhou) Information Technology Co., Ltd.

Inventor(s)

Shijie Cao of Hangzhou (CN)

Wenjie Li of Hangzhou (CN)

Hao Zhao of Hangzhou (CN)

DETECTION OF MALICIOUS BEHAVIOR OF APPLET - A simplified explanation of the abstract

This abstract first appeared for US patent application 18552128 titled 'DETECTION OF MALICIOUS BEHAVIOR OF APPLET

Simplified Explanation

The patent application describes a method for detecting malicious behavior in an applet by analyzing behavior records generated during its execution.

  • Behavior records are generated through triggering during the running of the applet.
  • Behavior features are extracted from each behavior record.
  • Feature combinations are formed using behavior features from multiple behavior records.
  • The method determines if there is a feature combination that includes a predetermined feature combination of a malicious behavior record.
  • If such a feature combination is found, the applet is identified as conducting malicious behavior.

Potential Applications

The technology described in this patent application could be used in cybersecurity systems to detect and prevent malicious behavior in applets and other software applications.

Problems Solved

This technology addresses the issue of identifying and stopping malicious behavior in applets, which can help protect users from security threats and prevent damage to systems.

Benefits

The benefits of this technology include enhanced security for applets, improved detection of malicious behavior, and increased protection against cyber threats.

Potential Commercial Applications

One potential commercial application of this technology could be in antivirus software or security suites that offer protection against malware and other malicious software.

Possible Prior Art

One possible prior art for this technology could be existing methods for behavior analysis and anomaly detection in software applications.

Unanswered Questions

How does this technology handle false positives in detecting malicious behavior?

The patent application does not provide information on how false positives in detecting malicious behavior are addressed. This could be an important consideration for the practical implementation of this technology.

What is the computational overhead of implementing this method for detecting malicious behavior?

The patent application does not discuss the computational resources required to implement this method for detecting malicious behavior. Understanding the computational overhead could be crucial for assessing the feasibility of deploying this technology in real-world applications.


Original Abstract Submitted

The specification provides a method for at least two behavior records that are generated through triggering during running of the applet are obtained; then, a behavior feature of each behavior record is extracted; next, at least one feature combination is formed by using at least two behavior features of at least two successively generated behavior records, where each feature combination includes at least two behavior features, and a sequence of the at least two behavior features in the feature combination is the same as a time sequence of generating behavior records corresponding to the at least two behavior features; and finally, it is determined whether there is a feature combination that includes a predetermined feature combination of a malicious behavior record; and if there is a feature combination that includes the predetermined feature combination of a malicious behavior record, it is determined that the applet conducts a malicious behavior.