Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Mobile application program behavior identification method based on spectral clustering and random forest algorithm

A random forest algorithm and mobile application technology, applied in the field of information security, can solve the problems of affecting the accuracy of the classifier, overfitting, and large algorithm time overhead, so as to reduce the clustering time complexity, reduce misjudgment, and reduce the time complexity. small effect

Active Publication Date: 2019-11-22
NANJING UNIV OF POSTS & TELECOMM
View PDF3 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the application behavior will generate very similar data flows, which will affect the accuracy of the classifier, and the algorithm time overhead will be particularly large when the amount of data is very large, and many existing technologies are prone to overfitting

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile application program behavior identification method based on spectral clustering and random forest algorithm
  • Mobile application program behavior identification method based on spectral clustering and random forest algorithm
  • Mobile application program behavior identification method based on spectral clustering and random forest algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The technical solution of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0047] according to figure 1 Given the overall process flow chart, the specific implementation of this embodiment is as follows:

[0048] Step 1: Write and run a simulation script to capture network traffic.

[0049] Simulation script writing and implementation, the specific steps are as follows:

[0050] 1.1 Use the ADB command to write a script that submits the operation sequence to the mobile phone to generate the application startup, touch and button. The full name of ADB command is Android Debug Bridge. It provides a general debugging tool. With this tool, we can debug the developed program well;

[0051] 1.2 Insert the written simulation script from the Wi-Fi access point, capture the data flow from the network flow script of the eavesdropping device from the network side, and record the execution time of each operation;

[0052] 1.3 By ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a mobile application program behavior identification method based on spectral clustering and a random forest algorithm, and belongs to the technical field of network security.The method comprises the following steps: acquiring encrypted data traffic of mobile application program equipment; performing feature extraction statistics on the encrypted traffic; performing spectral clustering preprocessing on the encrypted data stream feature data set; and finally, modeling the clustered data cluster data set through a random forest algorithm. According to the method, spectral clustering is used as preprocessing to reduce the opportunity of over-fitting of a classifier, and then a random forest ensemble classifier is used to accurately identify various behaviors of an application program.

Description

Technical field [0001] The invention relates to a mobile application program behavior identification method, in particular to a mobile application program behavior identification method based on spectral clustering and random forest algorithm, belonging to the technical field of information security. Background technique [0002] In the current BYOD era, with the development of 3G, 4G, 5G and other communication technologies and the rapid increase of mobile terminals, the scale of mobile terminal users continues to increase. Applications are the main driver of this growth because they provide convenient access to enhanced features. Now, smartphone applications have gradually replaced web browsers to interact with many online services (for example, media streaming, social networking, lifestyle, and finance). With the rapid development of the application market, security issues have also emerged. Application installations on typical smart phones may reveal sensitive information ab...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/851H04L12/911H04L29/06G06K9/62
CPCH04L47/2441H04L47/2483H04L47/827H04L63/0245G06F18/23G06F18/24323G06F18/214
Inventor 陈丹伟徐诗怡
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products