Rapid intelligent comparison and security detection method for big data of mobile malicious software

一种恶意软件、安全检测的技术,应用在电数字数据处理、计算机安全装置、计算机零部件等方向,能够解决错误率高等问题,达到保护产权和利益的效果

Active Publication Date: 2019-06-07
JINAN UNIVERSITY
View PDF25 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to solve the problem that the error rate of some programs in the prior art that are repackaged or cloned according to the code function is extremely high when using an algorithm for extracting application program fingerprints through fuzzy hashing or using feature hashing for code similarity analysis. High technical defects, providing a fast intelligent comparison and security detection method for mobile malware big data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Rapid intelligent comparison and security detection method for big data of mobile malicious software
  • Rapid intelligent comparison and security detection method for big data of mobile malicious software
  • Rapid intelligent comparison and security detection method for big data of mobile malicious software

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0043] This embodiment discloses a fast intelligent comparison and security detection method for mobile malware big data. By combining compressed character strings, description entropy and function hash values, the Hdsim algorithm and the entropy_descpt_sim algorithm are proposed to calculate the similarity of mobile software. In order to determine whether the mobile software is a repackaged program, whether it contains malicious attack code;

[0044] The function hash value is the unique identifier of the function. The equal hash value of two functions means that the functions of the two functions are the same, that is, the two functions are the same;

[0045] The entropy describes the semantic structure of a string and the degree of disorder of the subsequence in the entire sequence, and it also defines the abstract state of the combination and distribution of the sequence;

[0046] The compressed string is the compression of the expression in the function, one statement cor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a rapid intelligent comparison and security detection method for big data of mobile malicious software. As the mobile software application develops rapidly, many popular mobileapplications are copied or repackaged. An attacker may repackage the application to insert advertising profits or disseminate malware. Massive mobile software codes form big data, and the comparativecalculation volume of similarity is very huge. According to the method, the compressed character string, the description entropy and the hash value method are combined to provide a rapid intelligentcomparison detection algorithm; the similarity between the mobile application software is obtained through calculation, if the similarity between the mobile application software is greater than or equal to a preset threshold, the condition that the detection program has suspicion of repackaging or plagiarism is considered, further whether the detected mobile software has malicious attack codes ornot is analyzed, and finally the rapid security detection of the big data of the mobile software is realized.

Description

technical field [0001] The invention relates to the technical field of mobile security, in particular to a method for fast intelligent comparison and security detection of mobile malicious software big data. Background technique [0002] With the rapid development of the mobile application field, the number of mobile applications has exceeded 5 million, and the number of downloads has exceeded 30 billion. The mass of mobile software is developing rapidly, and more and more popular mobile applications are copied or repackaged. Attackers repackage applications to insert advertisements for profit or spread malware. This causes a great degree of damage to the ecosystem of the application. [0003] The existing method based on code comparison uses massive character string distance calculations to calculate the security detection speed of mobile software big data is very slow. Massive mobile software codes form big data, and the volume of similarity comparison calculations is v...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56
CPCG06F21/564G06F21/577G06F18/22G06F21/54G06F21/568G06F21/602
Inventor 官全龙罗伟其张焕明李哲夫崔林巫园芬
Owner JINAN UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products