Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Malicious software network behavior detection method specific to network service provider and system thereof

A network service and malware technology, which is applied in the field of mobile terminal malware detection, can solve problems such as user loss, and achieve the effect of small loss and avoiding lag

Active Publication Date: 2015-10-28
UNIV OF JINAN
View PDF3 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, at present, network service providers seldom carry out active detection and early warning for the network behavior of mobile terminal malware, and the prevention and control of mobile terminal malware is passively starting from complaints. This method is obviously lagging behind and often has caused irreparable damage to the user

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious software network behavior detection method specific to network service provider and system thereof
  • Malicious software network behavior detection method specific to network service provider and system thereof
  • Malicious software network behavior detection method specific to network service provider and system thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] Below in conjunction with accompanying drawing and embodiment the present invention will be further described:

[0060] The malicious software network behavior detection method for network service providers of the present invention includes:

[0061] The mobile terminal of the user is connected to the backbone network of the network service provider through the base station of the network service provider, and the backbone network of the network service provider is connected to the Internet;

[0062] When the user's mobile terminal accesses the Internet, the user's mobile terminal applies to the detection server for authentication;

[0063] After authentication processing, collect and cache user mobile terminal network traffic to the traffic data processing server by dynamically assigning traffic mirroring ports, then identify and privacy process the acquired user mobile terminal network traffic, and then extract and aggregate network traffic data features to form Feat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a malicious software network behavior detection method specific to a network service provider and a system thereof. The method comprises: a user mobile terminal is connected with a backbone network of a network service provider by a base station of the network service provider and the backbone network of the network service provider is connected with an internet network; when being connected to the internet network, the user mobile terminal applies to a detection server for authentication; after authentication processing, collection is carried out by a dynamic distribution flow mirror image port and the network flow of the user mobile terminal is cached to a flow data processing server, identification and privacy protection processing is carried out on the obtained network flow of the user mobile terminal, network flow data features are extracted and aggregated to form a feature set, and the feature set is transmitted to the detection server; the feature set is read and a detection model in the detection server detects features in the feature set; and detection results are returned to the backbone network of the network service provider by the flow data processing server and then are returned to the user mobile terminal finally.

Description

technical field [0001] The invention relates to a mobile terminal malicious software detection method, in particular to a network service provider-oriented malicious software network behavior detection method and system. Background technique [0002] With the widespread use of mobile terminals, especially the rapid popularization of smart phones, mobile smart terminals have brought great changes to modern society. Since entering the 21st century, we have quickly entered the mobile era. The mobile phone is no longer limited to communication services in the traditional sense, but has become a powerful terminal integrating e-commerce, personal payment, social entertainment and other functions. However, with the popularity of mobile applications and the explosive growth of the number of users, the security of mobile smart terminals is also facing great challenges. According to a 2013 China Internet Network Security Report released by the National Internet Emergency Response Cen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/1408H04L63/145
Inventor 张蕾王闪闪陈贞翔杨波韩泓波孙润元
Owner UNIV OF JINAN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products