Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for mobile internet malicious application software detection based on support vector machines

A support vector machine and mobile Internet technology, applied in the field of mobile Internet malicious application software detection, can solve the problems of end user infringement, malicious application software detection method is not mature enough, processing speed is slow, etc.

Inactive Publication Date: 2014-03-05
BEIJING UNIV OF POSTS & TELECOMM
View PDF2 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In terms of software, various network security vendors, such as Symantec, Kaspersky, Trend Micro, etc., have begun to devote themselves to security solutions for smart mobile terminals, and domestic companies such as Rising have also begun to conduct research on related products, but the technology still in an incomplete stage
[0004] Similar to the security problems encountered by traditional computers, mobile smart terminals have also encountered the same problems. Viruses, malicious programs, Trojan horses, etc. have also begun to appear on terminals, bringing many violations to end users.
This detection method is the solution used to scan and kill viruses on computers. Its disadvantage is that it cannot detect unknown viruses and requires an update of the virus database. This is a huge problem for terminal devices with slow processing speed and limited resources. challenges, further research is needed
However, most related products in China are still in the stage of free download and use, and many key technologies are not yet mature.
[0008] To sum up, the role of mobile Internet application software in people's life is becoming more and more important, while the detection method of mobile Internet malicious application software is not mature enough.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for mobile internet malicious application software detection based on support vector machines
  • Method for mobile internet malicious application software detection based on support vector machines
  • Method for mobile internet malicious application software detection based on support vector machines

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and the experimental conditions of the examples.

[0039] The present invention is a mobile Internet malicious application software detection method based on a support vector machine. The method first runs the application software to be detected and extracts the characteristic parameters of the software running for a period of time, and then uses these parameters and several basic software operation types Hidden Markov models are compared to obtain similarity vectors. Finally, on this basis, five SVM models are used for voting analysis to judge whether the current application software to be detected is a malicious application software. When detecting malicious application software, the present invention can overcome the shortcomings of incomplete definition of malici...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for mobile internet malicious application software detection based on support vector machines and belongs to the technical field of information safety. Currently, mobile internet application software plays a more and more important role in daily life of people; however, the method for mobile internet malicious application software detection is not mature enough. According to the method, the monitored mobile internet application software is analyzed according to a hidden Markov model so that the similarity level of each software basic operation type relative to current software can be obtained and a similarity vector can be formed; the similarity vector is input to five SVM models trained according to different kernel functions and whether an output result shows that the monitored mobile internet application software is a malicious application or not is judged by a voting system. According to the method, the shortages that a malicious behavior is defined imperfectly and a training dataset is overlarge in the prior art are overcome, effective detection on the malicious application software is achieved, and the reliability is high.

Description

technical field [0001] The invention relates to a method for detecting malicious application software in the mobile Internet, more precisely, to a method for detecting malicious application software in the mobile Internet based on a support vector machine, and belongs to the technical field of information security for malicious analysis of application software in the mobile Internet environment. Background technique [0002] With the advent of the mobile Internet era, the performance of mobile intelligent terminals is becoming more and more powerful, and the popularity is also increasing. In addition, the world is promoting the development of 3G and even 4G mobile networks. The high speed of mobile networks provides smart phone applications with the environment. Users start to consume music, electronic products, movies, maps, games and other applications on mobile smart terminals, and also use mobile smart terminals to communicate, such as social networks Facebook, Twitter, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/56H04L29/06
CPCG06F21/562
Inventor 张程鹏李承泽杨昕雨董航徐国爱
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products