A Wireless Router with Malware Network Behavior Discovery Capabilities

A wireless router and malware technology, applied in wireless communication, data exchange network, network traffic/resource management, etc., can solve the problems of high resource consumption of user terminals, stay in the academic research stage, difficult to deploy and implement on a large scale, etc. The effect of resolving deployment difficulties

Active Publication Date: 2018-12-18
UNIV OF JINAN
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This dynamic method has a certain ability to discover unknown malicious applications, but it consumes a lot of resources on user terminals and is difficult to implement on a large scale, so the relevant research is only at the academic research stage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Wireless Router with Malware Network Behavior Discovery Capabilities
  • A Wireless Router with Malware Network Behavior Discovery Capabilities
  • A Wireless Router with Malware Network Behavior Discovery Capabilities

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The present invention is described in detail below in conjunction with accompanying drawing:

[0044] The present invention uses the structure of the original wireless router (such as figure 1 shown) as the basis, a traffic behavior analysis module is added to the operating system (such as figure 2 shown). First, when the user's mobile terminal accesses the external network through a router, use the tcpdump tool installed in the router system to collect the interactive traffic between the user's mobile terminal device and the external network; then, the behavior analysis module reads the collected network traffic and analyze it; finally, if malicious traffic is detected, it means that a malicious application is installed on the user's mobile terminal device, and the detection result is fed back to the user through a prompt message.

[0045] A wireless router capable of discovering malicious software network behavior, it should include:

[0046] The traffic acquisiti...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a wireless router with malware network behavior discovery capability, comprising: a network flow acquisition module, which is used to collect flow from the network flow generated by collecting application software, and transmit it to the flow behavior analysis module; flow behavior analysis The module includes a feature extraction module, which is used to extract various features from network traffic data; a feature classification module, after feature extraction, classifies the extracted features according to different feature types; a model module, for each type of feature , each has a corresponding detection model; the configuration module is used to realize the model selection, patch control and output acquisition function, and the patch detection and result output module is used to detect the patch of the configuration module and output the result of the configuration module. Different detection models designed for different feature types can improve the accuracy of detection to a certain extent and meet the individual needs of users.

Description

technical field [0001] The invention relates to a wireless router with malware network behavior discovery capability. Background technique [0002] With the widespread use of mobile terminals, especially the rapid popularization of smart phones, mobile smart terminals have brought great changes to modern society. Since entering the 21st century, we have quickly entered the mobile era. The mobile phone is no longer limited to communication services in the traditional sense, but has become a powerful terminal integrating e-commerce, personal payment, social entertainment and other functions. According to Gartner's report statistics, in 2014, the global mobile phone market has reached 3.5 billion units (including 2.7 billion Android systems), which has exceeded the number of PCs, and it is predicted that by 2015 it will exceed 5 billion units. However, with the popularity of mobile applications and the explosive growth of the number of users, the security of mobile smart termi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/771H04W28/10H04L29/06H04W24/08H04L45/60
Inventor 张蕾曹栋陈贞翔杨波韩泓波李群
Owner UNIV OF JINAN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products