Improved forest algorithm-based Android malicious software detection method

A malware and forest algorithm technology, applied in the field of software security, can solve problems such as insufficient detection accuracy, high algorithm complexity, and complex technical implementation, and achieve the effect of reducing the probability of being attacked, high classification accuracy, and improving the accuracy rate

Inactive Publication Date: 2017-08-25
CIVIL AVIATION UNIV OF CHINA
View PDF5 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the research of the above two people has realized the detection of Android malware, the detection accuracy is not high enough.
[0005] Yuan Z et al. implemented an online malware detection tool Droid Detector by using a deep learning algorithm, which realized online detection and analysis of Android applications, but its algorithm complexity is high, and it consumes a lot of computer memory.
Wen Weiping proposed a collaborative malicious code detection scheme based on mobile phone and server, and Hang Huan et al. designed a three-layer hybrid ensemble algorithm (THEA) to comprehensively evaluate the malicious behavior of Android applications. relatively complex
[0006] To sum up, the current detection research results using machine learning algorithms are relatively mature, but there are still many deficiencies in detection accuracy, detection efficiency, implementation complexity, etc., and the solution of these problems will inevitably require research and improvement of detection algorithms

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Improved forest algorithm-based Android malicious software detection method
  • Improved forest algorithm-based Android malicious software detection method
  • Improved forest algorithm-based Android malicious software detection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments, but the following embodiments in no way limit the present invention.

[0027] Such as figure 1 As shown, the Android malware detection method based on the improved forest algorithm includes the following steps in order:

[0028] 1) The S01 stage of obtaining the data set: obtain the installation package files of benign software and malicious software from the application store, other network forums or research institutions, and then enter the S02 stage;

[0029] 2) S02 stage of reverse processing: decompile each installation package file obtained in step 1) respectively to obtain a decompiled folder containing AndroidManifest.xml file, and use the xml.dom module and IO module in Python language to pair The AndroidManifest.xml file is parsed to obtain the attributes of the Permission tag and the Intent tag, and then enter the S03 stage;

[0030]...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an improved forest algorithm-based Android malicious software detection method. The method comprises an S01 stage of obtaining a data set, an S02 stage of carrying out reverse processing, an S03 stage of extraction feature vectors, an S04 stage of optimizing the feature vectors, an S05 stage of generating a decision tree set, an S06 stage of calculating a decision tree weight, an S07 stage of generating a final classification result and an S08 stage of assessing the classification result. Compared with the traditional detection method, the improved forest algorithm-based Android malicious software detection method has higher classification precision, and has the effects of improving the correctness of malicious software detection and reducing the probability that Android systems are attacked due to detection errors.

Description

technical field [0001] The invention relates to the technical field of software security, in particular to an Android malware detection method based on an improved forest algorithm. Background technique [0002] The Android system is an open source operating system based on the Linux kernel. It has become the mobile device terminal platform with the largest market share, but its openness also makes it the largest development platform for malware; Software, relying solely on humans for detection and classification has long been outdated, and machine learning has become the mainstream. [0003] At present, many classification algorithms in machine learning are applied to Android malware detection. Zhang Yiting and others proposed a method based on naive Bayesian ( Bayes, NB)’s Android application malicious behavior identification method extracts whether the software has applied for too many permissions, whether there is a sensitive permission combination, etc. Rui and Yang...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56
Inventor 杨宏宇徐晋李爽
Owner CIVIL AVIATION UNIV OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products