Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Mobile malware detection method oriented on network encryption flow

A mobile application and network traffic technology, applied in the direction of electrical components, transmission systems, etc., can solve the problems of inability to distinguish malicious mobile application attack traffic, unable to determine mobile application encrypted network flow, etc., to facilitate deployment and use, reduce operating load, The effect of ensuring data privacy

Active Publication Date: 2018-03-02
NANJING UNIV OF POSTS & TELECOMM
View PDF5 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Analysis of malicious mobile application attack behavior found that typical malicious attacks such as sensitive information leakage and network penetration are mostly carried out through the network, and less than 1% of them rely on SMS text messages
This kind of research work can only judge whether the mobile application is abnormal from the overall network, but cannot distinguish the specific attack traffic generated by the malicious mobile application, that is, it is impossible to determine whether an encrypted network flow generated by the mobile application is malicious attack traffic

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile malware detection method oriented on network encryption flow
  • Mobile malware detection method oriented on network encryption flow
  • Mobile malware detection method oriented on network encryption flow

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0030] The present invention designs a kind of malicious mobile application detection method facing network encrypted flow, in practical application, specifically comprises the following steps:

[0031] Step A. Using a classification method based on machine learning to identify and obtain the mobile application corresponding to the encrypted network traffic to be judged as the mobile application object to be judged, wherein the classification method of machine learning learns the traffic characteristic models of different mobile applications in advance; and then The learned machine learning classification method is used to identify the encrypted network traffic to be judged, and obtain the mobile application corresponding to the encrypted network traffic to be judged as the mobile application object to be judged, and then...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a mobile malware detection method oriented on network encryption flow. By means of the mobile malware detection method oriented on the network encryption flow, whether the encryption flow generated by a mobile application is attack flow or not can be effectively analyzed; but, the existing method is mainly for plaintext flow to analyze; therefore, the detection method disclosed by the invention is an effective supplement of the existing research method; mobile malware detection of a network layer is relatively practical; simultaneously, according to the detection method disclosed by the invention, only the network flow is used as the input; an additional program does not need to be installed on a mobile terminal; a network flow content also does not need to be deeply analyzed; therefore, the operating load of the mobile terminal is lightened; furthermore, the data privacy of mobile users is ensured; and thus, the mobile malware detection method oriented on thenetwork encryption flow is convenient for practical deployment and use.

Description

technical field [0001] The invention relates to a method for detecting malicious mobile applications oriented to network encrypted traffic, and belongs to the technical fields of network security and malicious mobile application detection. Background technique [0002] With the rapid development of the mobile Internet, mobile smart terminals (such as smart phones, tablet Pads, smart watches, etc.) have become important auxiliary tools for daily social activities. However, the widespread use of mobile smart terminals has also attracted the attention of many attackers. Various malicious mobile application (Mobile malware) attacks emerge in an endless stream, and the security of mobile smart terminals is facing a severe test. [0003] Analysis of malicious mobile application attack behavior found that typical malicious attacks such as sensitive information leakage and network penetration are mostly carried out through the network, and less than 1% of them use SMS text messages....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1425H04L63/145
Inventor 何高峰孙雁飞王堃亓晋
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products