Abnormal flow inspection method and device
An abnormal traffic and abnormal technology, applied in the field of information security, can solve problems such as limited accuracy, loss of user traffic, data theft, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0023] The technical solutions of the present invention will be described in further detail below with reference to the accompanying drawings and embodiments.
[0024] In the security settings of the existing mobile terminals, the highest system authority is generally not opened to the user, and the program of the mobile terminal does not have the operation authority of the log file, that is, the default setting of the log file cannot be tampered with. In a cracked mobile terminal system, such as being "jailbroken" or "Rooted", the user has obtained the highest control authority over the system, and the program of the mobile terminal also has the operation authority to log files. This is also the fundamental reason why mobile terminal systems are more likely to be infected with malicious programs after being cracked. Therefore, according to the operation behavior of the network program in the mobile terminal on the system log, its abnormal situation can be judged, so as to det...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


