Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method of intrusion detection for android platform based on cfsfdp clustering

An intrusion detection and clustering technology, applied in the field of network information security, can solve the problems of occupying system resources, large differences in detection performance of different methods, lack of unknown attack detection capabilities, etc., to achieve accurate feature models, reduce computational complexity, reduce The effect of storage space

Active Publication Date: 2020-06-16
CHANGCHUN UNIV OF SCI & TECH
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In order to solve the problems that the existing static feature detection method occupies a large amount of system resources, lacks the ability to detect unknown attacks, the dynamic feature detection method has inconsistent data sources and model construction methods, and the detection performance of different methods is quite different, it provides A kind of Android platform intrusion detection method based on CFSFDP clustering, specifically comprises the following steps:

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method of intrusion detection for android platform based on cfsfdp clustering
  • A method of intrusion detection for android platform based on cfsfdp clustering
  • A method of intrusion detection for android platform based on cfsfdp clustering

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The present invention will be further described below in conjunction with accompanying drawings and implementation.

[0032] Such as figure 1 As shown, the present embodiment provides a method for Android platform intrusion detection based on CFSFDP clustering, which specifically includes the following steps:

[0033] Step 1: Collect and capture the static and dynamic features of the Android platform. Static features include permissions, Intent-filter, Java Code, etc., and dynamic features include System Call, Network Traffic, System Component, and user behavior. Static feature data is collected in a longer time span, and dynamic feature data is time-shared in a shorter time span;

[0034] Step 2: Normalize and discretize the feature data, obtain the normal behavior feature data, and calibrate the normal feature data. We use the robot monkey program to click on the native Android system and record its behavior. This part of the behavior is collected in a virus-free a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an Android platform intrusion detection method based on CFSFDP clustering, and relates to the field of network information security. The problems that existing static feature detection methods occupy a great number of system resources, existing dynamic feature detection methods have different data sources and model construction methods, detection performance difference of different methods is large, and the like are solved, and static features and dynamic features of an Android platform are collected and captured; static data and dynamic feature data are normalized anddiscretized, normal behavior feature data is obtained, and the normal behavior feature data is calibrated; a CFSFDP algorithm is adopted to cluster the feature data to generate contours; abnormality detection is conducted on the generated behavioral contours, it is determined that whether or not current points are within the cutoff distance of point in the contours, if yes, the behaviors re considered as normal behaviors, otherwise as abnormal behaviors, and the abnormal behaviors push alarms in real time, and feed back current feature status information to a user. The method can reduce the amount of storage of the contours without reducing the contour accuracy.

Description

technical field [0001] The invention relates to the field of network information security, and relates to an Android platform intrusion detection method based on clustering by Fast Search and Find of Density Peaks (CFSFDP Clustering by Fast Search and Find of Density Peaks). Background technique [0002] Intrusion detection method is a common method to protect information security and ensure the normal operation of global information infrastructure, and it is an important research direction in the field of information security. In recent years, with the widespread application of the Android platform and its services, its security issues have also received extensive attention. The security mechanism of the existing Android platform has limitations, and the Android platform intrusion detection is a good supplement and expansion. According to the different data sources, intrusion detection methods on the Android platform can be divided into two categories: static features and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/56
CPCG06F21/562G06F21/566
Inventor 任维武底晓强郑方林张剑飞毕琳
Owner CHANGCHUN UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products