Android malicious application detection method and system based on multi-feature fusion

A malicious application, multi-feature fusion technology, applied in the field of network security, can solve problems such as high-dimensional feature analysis of rare sample families of malicious code, and achieve the effects of efficient fusion processing, reducing interference, and improving detection accuracy

Active Publication Date: 2020-05-29
BEIJING INSTITUTE OF TECHNOLOGYGY
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] In view of this, the present invention provides a method and system for detecting Android malicious applications based on multi-feature fusion, which can solve the problem of high-dimensional feature analysis of rare sample families of malicious codes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Android malicious application detection method and system based on multi-feature fusion
  • Android malicious application detection method and system based on multi-feature fusion
  • Android malicious application detection method and system based on multi-feature fusion

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] The present invention will be described in detail below with reference to the accompanying drawings and examples.

[0053] The present invention proposes a detection scheme for Android malicious applications based on multi-feature fusion, and its basic idea is: decompile Android malicious application samples to obtain decompiled apk files; extract static data from decompiled apk files Features; extract dynamic features by running the apk file in the Android emulator; for static features and dynamic features, use the text hash algorithm part of the local sensitive hash algorithm to perform feature mapping, and map to the low-dimensional feature space to obtain the fused Feature vectors; finally, based on the fused feature vectors, a classifier is trained using a machine learning classification algorithm; the classifier is used to classify and detect Android malicious applications.

[0054] In order to achieve the above solution, the present invention provides a multi-fea...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and system for detecting malicious Android applications based on multi-feature fusion. The method decompiles Android application samples to obtain decompiled files; extracts static features from the decompiled files; Run the Android application sample to extract dynamic features; for static features and dynamic features, use the text hash map part of the local sensitive hash algorithm to perform feature mapping, and map to the low-dimensional feature space to obtain the fused feature vector; based on the fused A feature vector is used to train a classifier using a machine learning classification algorithm, and the classifier is used for classification and detection. The invention can solve the problem of high-dimensional characteristic analysis of the rare sample family of malicious codes, and improves the detection accuracy.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a multi-feature fusion-based Android malicious application detection method and system. Background technique [0002] With the hot sales of smartphones, mobile Internet access is becoming more and more popular, and the outbreak of the mobile Internet era has driven smartphones to become more versatile. With the explosive growth of mobile phone users and the convenience of mobile Internet access, mobile phone security risks are becoming more and more serious. More and more problems are becoming more and more prominent. While mobile smartphones create convenience for users, they also bring new development directions for malicious code attacks on mobile phones. The large amount of user personal privacy data stored in mobile phones and the potential huge economic benefits of mobile Internet have made hackers and malware creators take smartphones as new attack targets. [00...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/56G06N20/00G06K9/62
CPCG06F21/562G06F21/566G06N20/00G06F18/253
Inventor 薛静锋张继蔡建宇彭图王勇
Owner BEIJING INSTITUTE OF TECHNOLOGYGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products