Android malicious application detection method and system based on parallel ensemble learning

An integrated learning and malicious application technology, applied in the field of network security, can solve problems such as difficulties, dynamic behavior characteristics that consume a lot of time, economic losses, etc., and achieve the effects of improving efficiency and accuracy, saving computer resources, and improving efficiency and speed

Inactive Publication Date: 2019-09-20
HUNAN POLICE ACAD
View PDF5 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Malicious Android applications bring harm to governments, enterprises, and individual users through some malicious behaviors, such as stealing private information, malicious deduction, rogue behavior, etc., and even cause huge economic losses
Existing research work has laid a solid foundation for Android malicious application detection. However, in specific model applications, most research tends to focus on the analysis and detection of Android malicious applications usin

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Android malicious application detection method and system based on parallel ensemble learning
  • Android malicious application detection method and system based on parallel ensemble learning
  • Android malicious application detection method and system based on parallel ensemble learning

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] In order to enable those skilled in the art to better understand the technical solution of the present invention, the present invention will be described in detail below in conjunction with the accompanying drawings. The description in this part is only exemplary and explanatory, and should not have any limiting effect on the protection scope of the present invention. .

[0050] It should be noted that like numerals and letters denote similar items in the following figures, therefore, once an item is defined in one figure, it does not require further definition and explanation in subsequent figures.

[0051]It should be noted that the orientation or positional relationship indicated by the terms "center", "upper", "lower", "left", "right", "vertical", "horizontal", "inner" and "outer" are Based on the orientation or positional relationship shown in the drawings, or the conventional orientation or positional relationship of the invention product in use, it is only for th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an Android malicious application detection method and system based on parallel ensemble learning, and the method comprises the steps: carrying out the reverse engineering of a to-be-detected Android application, obtaining a source code file and a configuration file of the to-be-detected Android application, and extracting static behavior characteristics from the source code file and the configuration file; screening the static behavior characteristics; constructing behavior feature vectors according to the screened static behavior features; and constructing a parallel integrated learning model according to the behavior feature vector and a machine learning algorithm, and detecting the Android malicious application according to the parallel integrated learning model. The system provided by the invention comprises an extraction module, a filtering module, a first processing module, a second processing module and a detection module. According to the method and the system provided by the invention, the Android malicious application can be comprehensively, efficiently and accurately detected by comprehensively extracting the static behavior characteristics, screening the static behavior characteristics and constructing the parallel integrated learning model.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a method and system for detecting Android malicious applications based on parallel integrated learning. Background technique [0002] The Android platform and its applications have gradually replaced PCs and become the preferred electronic devices for people's daily work, life and entertainment due to their diverse functions and flexible use. However, due to the large amount of user privacy data stored on Android smartphones, such as confidential documents, contact information, bank card accounts, etc., and the open source nature of the Android platform, the technical threshold for creating malicious applications is lowered, and the number of Android malicious applications has increased sharply. growth and diversification. The "McAfee Labs Threat Report" released by McAfee, the world's leading network security company, in November 2017 showed that more than 12 million A...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/56G06K9/62
CPCG06F21/562G06F18/24G06F18/214
Inventor 苏欣刘绪崇鄢喜爱其他发明人请求不公开姓名
Owner HUNAN POLICE ACAD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products