Intelligent terminal vulnerability mining and malicious behavior detection method

A detection method and technology of intelligent terminals, which are applied in the fields of instruments, digital data processing, platform integrity maintenance, etc., can solve the problems of intelligent terminal vulnerability mining and imperfect malicious behavior detection, and achieve perfect detection data, high efficiency, and operation. easy effect

Inactive Publication Date: 2016-08-17
NANJING ZHONGKE LONGMAI INTERNET OF THINGS TECH
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Smart terminal vulnerability mining and malicious behavior detection are not yet perfect, and need to be further improved

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0012] This specific embodiment adopts following technical scheme: its detection method is:

[0013] Step 1: Build a model: Build a model based on the trends of network vulnerabilities and malicious behaviors;

[0014] Step 2: Establish analysis software: use the hidden Markov model to analyze the mobile Internet application software to be detected, obtain the similarity degree of the current software with respect to each basic operation type of the software, and form a similarity vector;

[0015] Step 3: Offline software testing: use offline software testing, and improve the software according to the loopholes;

[0016] Step 4: Online software testing: Use isolation to conduct online software testing, segment the network, conduct online testing for each segment, detect loopholes and malicious behaviors, and transmit data to smart terminals;

[0017] Step 5: Establish a mobile network: establish an independent network according to the required network, and apply the measureme...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a smart terminal vulnerability mining and malicious behavior detection method, which relates to the technical field of smart terminals; its detection method is as follows: step 1: building a model: building a model according to the trend of network loopholes and malicious behavior; step 2: Establish analysis software: use the hidden Markov model to analyze the mobile Internet application software to be tested, obtain the similarity degree of the current software with respect to each type of software basic operation type, and form a similarity vector; Step 3: Offline test software: use offline Carry out software test in the mode of testing, perfect software according to loophole simultaneously; Step 4: online test software; Detection, and detection data is complete, easy to operate, high efficiency.

Description

Technical field: [0001] The invention relates to the technical field of intelligent terminals, in particular to a method for mining vulnerabilities and detecting malicious behaviors of intelligent terminals. Background technique: [0002] The Internet is also known as the Internet, or the transliteration of the Internet, the Internet, the Internet began in 1969 in the United States of the Arpanet. It is a huge network connected in series between networks. These networks are connected by a set of common protocols to form a logically single huge international network. Generally, the internet generally refers to the Internet, while the Internet refers to the Internet in particular. This method of interconnecting computer networks can be called "network interconnection". On this basis, a global Internet covering the whole world is developed called the Internet, which is a network structure that is interconnected. The Internet is not the same as the World Wide Web. The World Wi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57G06F21/56
CPCG06F21/577G06F21/56G06F2221/033
Inventor 傅涛朱平蒋霞俞正兵
Owner NANJING ZHONGKE LONGMAI INTERNET OF THINGS TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products