Unlock instant, AI-driven research and patent intelligence for your innovation.

Intelligent detection and security protection methods for mobile Internet big data applications

A mobile Internet and mobile application technology, applied in the field of intelligent detection and security protection of mobile Internet big data applications, can solve problems such as high error rate, slow process, incomplete information, etc., and achieve the effect of security assurance

Active Publication Date: 2021-07-27
JINAN UNIVERSITY
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In the existing technology, some programs are repackaged or cloned according to the code function. When using the fuzzy hash to extract the application fingerprint or use the feature hash to analyze the code similarity, the error rate is high and the process is slow. , the problem of incomplete information, the purpose of the present invention is to solve this problem, to provide an intelligent detection and security protection method for mobile Internet big data applications

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intelligent detection and security protection methods for mobile Internet big data applications
  • Intelligent detection and security protection methods for mobile Internet big data applications
  • Intelligent detection and security protection methods for mobile Internet big data applications

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0063] This embodiment discloses an intelligent detection and security protection method for mobile Internet big data applications, the specific process is as follows figure 1 As shown, the method includes the following steps:

[0064] S1. Detect basic attributes of the mobile application. Upload the mobile application that needs to be detected, detect its basic attribute information, and display its basic information attributes;

[0065] S2. Carry out plagiarism similarity detection to the mobile application, and judge whether there is suspicion of heavy packaging (such as figure 2 );

[0066] The process of judging whether the mobile application is suspected of being repackaged in step S2 is as follows:

[0067] By calculating the similarity of the mobile application to be detected, and comparing it with a predetermined comparison threshold, if the similarity value is greater than or equal to the predetermined comparison threshold, it is determined that the mobile applic...

Embodiment 2

[0109] This embodiment discloses another intelligent detection and security protection method for mobile Internet big data applications. It should be pointed out that the security reinforcement processing in step S5 of this embodiment is specifically as follows:

[0110] Aiming at the mobile application information detected by the previous intelligence, security hardening is performed on the mobile application. The security hardening process is mainly realized through the mixed encryption protection technology of the dex file of the mobile application and the modification of its xml configuration file. The detailed process is as follows: image 3 .

[0111] The dex file is an executable file in the Android system, that is, a class file generated by compiling the java code of the Android application. It includes the source code of the App. When the program is decompiled, the most important thing is to decompile this file. Therefore, encrypting the dex file can effectively prev...

Embodiment 3

[0116] This embodiment discloses another intelligent detection and security protection method for mobile Internet big data applications. It should be pointed out that in step S6 of this embodiment, the attribute information of the stored mobile applications is classified and sorted through the clustering algorithm. The process is as follows:

[0117] In the intelligent detection and security protection method of mobile Internet big data applications, the density-based clustering algorithm is used to classify and organize the attribute information of mobile applications. The density-based clustering algorithm performs clustering according to the density distribution of samples. Usually, density clustering examines the connectivity between samples from the perspective of sample density, and continuously expands clusters based on connected samples to obtain the final clustering results. Detailed process such as Figure 6 shown.

[0118] In this embodiment, a DBSCAN (Density-Ba...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an intelligent detection and safety protection method for mobile Internet big data applications. With the advent of the mobile app big data era, it can be found that more and more mobile apps are copied or repackaged. Criminals repackage mobile applications by highly imitating native mobile applications, implanting malicious codes, etc., causing users to cause privacy leaks, remote control and other hazards when using applications. The present invention uses description entropy similarity method, resource similarity detection, statistical similarity detection and character string similarity intelligent detection to detect whether there is plagiarism or malicious behavior in the mobile application, and intelligently analyzes whether there are malicious attack codes and potential loopholes; through clustering algorithm, confusion Encryption technology classifies and strengthens the security of applications to realize intelligent detection and security protection of mobile big data applications.

Description

technical field [0001] The invention relates to the technical field of mobile application security, in particular to an intelligent detection and security protection method for mobile Internet big data applications. Background technique [0002] With the advent of the era of big data and the rapid development of the mobile Internet, the field of mobile Internet applications continues to expand. At present, mobile Internet applications have become an indispensable and important content in people's lives. [0003] With the development of mobile Internet applications, more and more mobile application users have been attacked. The reason is mainly due to the openness of the underlying technology platform of the mobile application system, which allows the convenient development of third-party applications. Therefore, it is easy for criminals to implant malicious files after highly imitating the file names and UI interfaces of native mobile applications. Code, tamper with the ap...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/55G06F21/56G06F16/16
CPCG06F21/55G06F21/562G06F21/566G06F16/16G06F16/162
Inventor 官全龙罗伟其张焕明崔林李荣君巫园芬
Owner JINAN UNIVERSITY