Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An android malicious code detection method based on community structure analysis

A malicious code detection and community structure technology, applied in the field of malicious code of a large number of Android application samples, can solve the problems of unfavorable resistance to variant viruses, high time-consuming, high detection rate, improved operating efficiency, and reduced computational complexity. Effect

Active Publication Date: 2019-02-19
SICHUAN UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The technical problem to be solved by the present invention is to provide an Android malicious code detection method based on community structure analysis, which solves the time-consuming problems caused by graph similarity comparison in many traditional malicious code detection methods based on structural features, and the construction of a malicious code with a specific The meaningful graph structure is not conducive to fighting against a large number of mutant viruses generated by repackaging technology; it also improves the community generation method and improves the execution efficiency of this method in graph segmentation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An android malicious code detection method based on community structure analysis
  • An android malicious code detection method based on community structure analysis
  • An android malicious code detection method based on community structure analysis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. The method of the present invention combines the structural features of the function call graph and the static features of the application program to determine the most ideal community division results, and then extracts the features used for machine learning from the finally divided communities, and puts them into the feature vector for further analysis. Classification learning, so as to achieve the purpose of judging the maliciousness of the application. The method of the present invention improves the division efficiency of graphs by improving the GN method, and uses machine learning technology to judge maliciousness, which also bypasses the complicated calculation caused by graph similarity comparison. Experimental results show that the method can identify malicious codes efficiently.

[0042] according to figure 2 The detection ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention proposes an Android malicious code detection method based on community structure analysis. In the process of reverse analysis of the target program, firstly, important static feature information such as permissions, functions, classes, and system APIs are automatically obtained; then, using functions and The function call graph is constructed by the calling relationship between functions, and the function call graph is preprocessed; the weighted function call graph is cyclically split and analyzed to obtain the correct division of the community structure; finally, the extracted from the community structure The features are machine-learned to obtain the final judgment result of maliciousness. The method of the invention can quickly analyze the internal structure of the program and detect malicious codes when facing a large number of Android application program samples generated by the "repacking" technology.

Description

technical field [0001] The invention relates to the field of malicious code detection of Android mobile terminal applications, in particular to fast detection of malicious codes of a large number of Android application program samples generated by the "repacking" technology. Background technique [0002] In recent years, as "repackaging" and "code obfuscation" techniques have been widely applied to malicious mobile applications, a lot of research work on malicious code has been carried out around analyzing the internal structure of applications. Many detection methods based on the internal structure characteristics of the program can extract or construct different graph call structures by analyzing the decompiled code of the target program, and then determine the maliciousness of the program by comparing the difference between the graph structure of the target sample and the malicious sample. The research results show that this type of detection method has a better effect in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/56G06N20/00
CPCG06F21/563G06F2221/033G06N20/00G06Q10/047G06F40/30G06F11/3676G06F17/16G06F21/561
Inventor 王俊峰杜垚高展徐宝新
Owner SICHUAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products