Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A large-scale Android malware automatic detection system and method

An automatic detection and malware technology, applied in the direction of platform integrity maintenance, etc., can solve the problems of identifying malware, improving the overall learning accuracy rate that cannot be coordinated, and Android security software cannot be granted the highest authority of the system, so as to achieve accurate identification Effect

Inactive Publication Date: 2018-12-11
中共中央办公厅电子科技学院
View PDF6 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] With the continuous disclosure of various system vulnerabilities, the existing Android smartphones are like a leaky ship. Even though the mobile phone security software can alleviate some security risks, the loopholes in the system have not been effectively repaired, and the Android security software cannot Has been granted the highest authority of the system, so Android system security issues have always been very difficult
Most of the proposed solutions are based on permission features to detect malware. However, with the emergence of technologies such as decompilation, code tampering, and disassembly, malware cannot be identified well only by permission features. Although the combined method has increased the feature selection method on the basis of the past, it is still unable to select features more comprehensively.
Secondly, on the algorithm of machine learning, generally only one algorithm will be selected for testing. Whether it is machine learning or deep learning, it is impossible to improve the accuracy of the overall learning.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A large-scale Android malware automatic detection system and method
  • A large-scale Android malware automatic detection system and method
  • A large-scale Android malware automatic detection system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The solution of the present invention is realized through the following scheme: the user submits the Android executable file to be detected locally, and the server is responsible for analyzing the submitted sample, and then detects on the model that the system has learned, obtains the result, and returns Analyze the results to the user, and automatically classify whether the submitted software collection is malicious software.

[0040] 1. the realization process of the present invention is:

[0041] (1) Collect security software and malware libraries. Malware obtains a fixed number of samples from Google play, together with known malware data sets, to form the initial sample set of the scheme.

[0042] (2) Use software analysis tools such as Androguard and Droidbox to collect the characteristics of each software from dynamic and static perspectives to form a table of Android software characteristics.

[0043] (3) Process the receipt of the form, specify a threshold, an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a large-scale malicious Android software automatic detection system and method based on multi-class features and machine learning. The method includes: collecting security andmalware libraries, using software analysis tools such as Androguard and Droidbox, collecting the characteristics of each software from both dynamic and static angles, processing the receipts of the forms, defining the thresholds in different angles, when a certain feature does not meet the threshold requirements, deleting the feature, and utilizing a support vector machine, a neural network, an ensemble learning algorithm and other algorithms for detection, and obtaining the optimal results of detection results are obtained, so as to realize the automatic detection of large-scale malware. Theinvention can be used for detecting and identifying large-scale malicious mobile phone software and protecting the privacy and safety of users.

Description

technical field [0001] The invention relates to the technical field of mobile terminal security, in particular to a large-scale malicious software automatic detection system and method. Background technique [0002] With the popularity of smartphones, malware is also growing rapidly. For mobile devices with the Android operating system, its open source nature makes it a prime target for malware developers. [0003] With the continuous disclosure of various system vulnerabilities, the existing Android smartphones are like a leaky ship. Even though the mobile phone security software can alleviate some security risks, the loopholes in the system have not been effectively repaired, and the Android security software cannot It is granted the highest authority of the system, so Android system security issues have always been very difficult. The traditional way of detecting whether software is malicious mainly relies on manually analyzing the code, but with the increasing number o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/56
CPCG06F21/56
Inventor 钱榕唐瑶王志强池亚平汪永好张健毅陈颖赵绪营张艳硕马平川
Owner 中共中央办公厅电子科技学院
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products