Log in
Enquire now
‌

US Patent 11886586 Malware families identification based upon hierarchical clustering

Patent 11886586 was granted and assigned to Trend Micro on January, 2024 by the United States Patent and Trademark Office.

OverviewStructured DataIssuesContributors

Contents

Is a
Patent
Patent
0

Patent attributes

Patent Applicant
Trend Micro
Trend Micro
0
Current Assignee
Trend Micro
Trend Micro
0
Patent Jurisdiction
United States Patent and Trademark Office
United States Patent and Trademark Office
0
Patent Number
118865860
Patent Inventor Names
Li-Chun Sung0
Hsin-Wen Kung0
Hsing-Yun Chen0
Yin-Ming Chang0
Si-Wei Wang0
Date of Patent
January 30, 2024
0
Patent Application Number
168116510
Date Filed
March 6, 2020
0
Patent Citations
‌
US Patent 10972495 Methods and apparatus for detecting and identifying malware by mapping feature data into a semantic space
0
‌
US Patent 8266698 Using machine infection characteristics for behavior-based detection of malware
0
‌
US Patent 8769676 Techniques for identifying suspicious applications using requested permissions
0
‌
US Patent 9130778 Systems and methods for spam detection using frequency spectra of character strings
0
‌
US Patent 10922410 System and method for generating a convolution function for training a malware detection model
0
‌
US Patent 11036858 System and method for training a model for detecting malicious objects on a computer system
0
Patent Citations Received
‌
US Patent 12013937 Detection and identification of malware using a hierarchical evolutionary tree
0
Patent Primary Examiner
‌
Samson B Lemma
0
CPC Code
‌
G06F 9/54
0
‌
G06F 21/56
0
‌
G06F 21/568
0
‌
G06F 21/566
0
Patent abstract

Behavior report generation monitors the behavior of unknown sample files executing in a sandbox. Behaviors are encoded and feature vectors created based upon a q-gram for each sample. Prototypes extraction includes extracting prototypes from the training set of feature vectors using a clustering algorithm. Once prototypes are identified in this training process, the prototypes with unknown labels are reviewed by domain experts who add a label to each prototype. A K-Nearest Neighbor Graph is used to merge prototypes into fewer prototypes without using a fixed distance threshold and then assigning a malware family name to each remaining prototype. An input unknown sample can be classified using the remaining prototypes and using a fixed distance. For the case that no such prototype is close enough, the behavior report of a sample is rejected and tagged as an unknown sample or that of an emerging malware family.

Timeline

No Timeline data yet.

Further Resources

Title
Author
Link
Type
Date
No Further Resources data yet.

References

Find more entities like US Patent 11886586 Malware families identification based upon hierarchical clustering

Use the Golden Query Tool to find similar entities by any field in the Knowledge Graph, including industry, location, and more.
Open Query Tool
Access by API
Golden Query Tool
Golden logo

Company

  • Home
  • Press & Media
  • Blog
  • Careers
  • WE'RE HIRING

Products

  • Knowledge Graph
  • Query Tool
  • Data Requests
  • Knowledge Storage
  • API
  • Pricing
  • Enterprise
  • ChatGPT Plugin

Legal

  • Terms of Service
  • Enterprise Terms of Service
  • Privacy Policy

Help

  • Help center
  • API Documentation
  • Contact Us
By using this site, you agree to our Terms of Service.