Mobile internet malignant application software detection method based on behavior model

A mobile Internet and application software technology, applied in neural learning methods, biological neural network models, instruments, etc., can solve problems such as inability to detect unknown viruses, immature detection methods for malicious application software, and end-user violations.

Inactive Publication Date: 2014-01-08
BEIJING UNIV OF POSTS & TELECOMM
View PDF3 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In terms of software, various network security vendors, such as Symantec, Kaspersky, Trend, etc., have begun to devote themselves to security solutions for smart mobile terminals, and domestic companies such as Rising have also begun to conduct research on related products, but the technology is not yet available. in an imperfect stage
[0004] Similar to the security problems encountered by traditional computers, mobile smart terminals have also encountered the same problems. Viruses, malicious programs, Trojan horses, etc. have also begun to appear on the terminals, bringing many violations to end users.
This detection method is the solution used to scan and kill viruses on computers. Its disadvantage is that it cannot detect unknown viruses and requires an update of the virus database. This is a huge problem for terminal devices with slow processing speed and limited resources. challenges, further research is needed
However, domestic related products are still in the stage of free download and use, and many key technologies are not yet mature.
[0008] To sum up, the role of mobile Internet application software in people's life is becoming more and more important, while the detection method of mobile Internet malicious application software is not mature enough.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile internet malignant application software detection method based on behavior model
  • Mobile internet malignant application software detection method based on behavior model
  • Mobile internet malignant application software detection method based on behavior model

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and the experimental conditions of the examples.

[0048] The present invention is a mobile Internet malicious application software detection method based on a behavior model. The method first runs the application software to be detected and extracts the characteristic parameters of the software running for a period of time, and then utilizes these parameters and the hidden information of several basic software operation types. The Markov model is compared to obtain the similarity vector. Then, simple processing is performed based on the similarity vector. Finally, on this basis, the non-malicious behavior model is used for analysis to determine whether the current application software to be detected is a malicious application software. When detecting malicious appl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a mobile internet malicious application software detection method based on a behavior model. The operation steps of the method include that (1) to-be-detected mobile internet application software is analyzed by means of a Hidden Markov Model to obtain the similarity of a basic operation type of the current software relative to each kind of software, and a similarity vector is formed; (2) arrangement is carried out on the basis of the similarity vector and a type detection vector is obtained; (3) an off-line training mode is adopted, a non-malicious behavior model is built by the method based on a neural network, and according to the well-trained model, whether the current application software is the malicious application software is judged in an on-line test mode.

Description

technical field [0001] The invention relates to a method for detecting malicious application software in the mobile Internet, more precisely, to a method for detecting malicious application software in the mobile Internet based on a behavior model, and belongs to the technical field of information security for malicious analysis of application software in the mobile Internet environment. Background technique [0002] With the advent of the mobile Internet era, the performance of mobile intelligent terminals is becoming more and more powerful, and the popularity is also increasing. In addition, the world is promoting the development of 3G and even 4G mobile networks. The high speed of mobile networks provides smart phone applications with the environment. Users start to consume music, electronic products, movies, maps, games and other applications on mobile smart terminals, and also use mobile smart terminals to communicate, such as social networks Facebook, Twitter, Weibo, e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56
CPCG06F21/566G06N3/08
Inventor 李祺郭燕慧徐国爱李承泽董航
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products