Intelligent detection and security protection methods for mobile Internet big data applications
A mobile Internet and mobile application technology, applied in the field of intelligent detection and security protection of mobile Internet big data applications, can solve problems such as high error rate, slow process, incomplete information, etc., and achieve the effect of security assurance
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0063] This embodiment discloses an intelligent detection and security protection method for mobile Internet big data applications, the specific process is as follows figure 1 As shown, the method includes the following steps:
[0064] S1. Detect basic attributes of the mobile application. Upload the mobile application that needs to be detected, detect its basic attribute information, and display its basic information attributes;
[0065] S2. Carry out plagiarism similarity detection to the mobile application, and judge whether there is suspicion of heavy packaging (such as figure 2 );
[0066] The process of judging whether the mobile application is suspected of being repackaged in step S2 is as follows:
[0067] By calculating the similarity of the mobile application to be detected, and comparing it with a predetermined comparison threshold, if the similarity value is greater than or equal to the predetermined comparison threshold, it is determined that the mobile applic...
Embodiment 2
[0109] This embodiment discloses another intelligent detection and security protection method for mobile Internet big data applications. It should be pointed out that the security reinforcement processing in step S5 of this embodiment is specifically as follows:
[0110] Aiming at the mobile application information detected by the previous intelligence, security hardening is performed on the mobile application. The security hardening process is mainly realized through the mixed encryption protection technology of the dex file of the mobile application and the modification of its xml configuration file. The detailed process is as follows: image 3 .
[0111] The dex file is an executable file in the Android system, that is, a class file generated by compiling the java code of the Android application. It includes the source code of the App. When the program is decompiled, the most important thing is to decompile this file. Therefore, encrypting the dex file can effectively prev...
Embodiment 3
[0116] This embodiment discloses another intelligent detection and security protection method for mobile Internet big data applications. It should be pointed out that in step S6 of this embodiment, the attribute information of the stored mobile applications is classified and sorted through the clustering algorithm. The process is as follows:
[0117] In the intelligent detection and security protection method of mobile Internet big data applications, the density-based clustering algorithm is used to classify and organize the attribute information of mobile applications. The density-based clustering algorithm performs clustering according to the density distribution of samples. Usually, density clustering examines the connectivity between samples from the perspective of sample density, and continuously expands clusters based on connected samples to obtain the final clustering results. Detailed process such as Figure 6 shown.
[0118] In this embodiment, a DBSCAN (Density-Ba...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


