Android malicious software detection method based on combined feature mode
A malware and combined feature technology, applied in the field of mobile security, can solve the problems of destroying system rights, stealing private information, and account theft, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment
[0127] The present embodiment discloses a kind of Android malicious software detection technology based on combined feature pattern, and the steps are as follows:
[0128] Step S1, obtaining a certain number of Android malware training samples and a certain number of Android benign software training samples to construct a training sample set;
[0129] Step S2, for each training sample in the training sample set, respectively analyze the authority characteristics and sensitive API characteristics of each training sample, and generate the feature vector of each training sample by combining the authority characteristics and sensitive API characteristics analyzed above; in this implementation In the example, each training sample corresponds to a feature vector; the feature vector of a training sample is composed of multiple elements, one of which corresponds to whether a permission feature is applied for by a training sample, or corresponds to the number of times a sensitive API fe...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com