Multi-malware hybrid detection method, system and device with privacy protection

A malware detection method technology, applied in the transmission system, security device, digital transmission system, etc., can solve the problems of malicious application damage, no consideration of user privacy protection, lack of application programs, etc.

Active Publication Date: 2022-04-12
XIDIAN UNIV
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] (1) There is a lack of solutions in the prior art that can effectively detect whether an application is malicious before installation and in real-time operation
[0009] (2) The existing technology does not consider the priority of detection. For popular and widely used software, in order to prevent damage caused by malicious behavior, it should be detected first whether it is malicious
[0010] (3) The existing technology does not consider the user's privacy protection in the cloud server malware detection process
[0012] The difficulty of the above-mentioned technical problems lies in determining an effective detection scheme before the application is installed and used and in real-time operation, how to determine the detection priority to reduce the damage caused by malicious applications, and how to protect the user's privacy during the entire detection process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-malware hybrid detection method, system and device with privacy protection
  • Multi-malware hybrid detection method, system and device with privacy protection
  • Multi-malware hybrid detection method, system and device with privacy protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0114] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0115] In view of the problems existing in the prior art, the present invention provides a privacy-protected multi-malware hybrid detection method, system, and device, which has a privacy-enhanced multi-malware hybrid detection system with priority evaluation. The following describes the present invention in conjunction with the accompanying drawings Make a detailed description.

[0116] Such as figure 1 As shown, the multi-malware mixed detection method provided by the embodiment of the present invention includes the following steps:

[0117] S101: The third party generates a public-private key pair according to the homo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of malicious software detection, and discloses a mixed detection method, system and device for multiple malicious software with privacy protection. The third party generates a public-private key pair according to the homomorphic encryption algorithm, and publishes the public key; the client collects the behavior data of the user group using the software, conducts preliminary calculations, encrypts with the third-party public key, adds it to the generated random number, and uploads the result to Server: The server uses the reputation evaluation algorithm to encrypt data according to the uploaded user group, utilizes the homomorphic nature and interacts with the third party to decrypt, completes the calculation of different software reputation values, and determines the software detection sequence according to the software reputation value; Call the API usage data obtained by the decompiled software APK from the client in order, and perform static detection on the software according to the static learning model. Public key, using homomorphic properties and dynamic learning model for real-time detection.

Description

technical field [0001] The invention belongs to the technical field of malicious software detection, and in particular relates to a privacy-protected multi-malware mixed detection method, system and device. Background technique [0002] At present, the closest existing technology: mobile malware refers to the existence of eavesdropping on user calls, stealing user information, destroying user data, unauthorized use of paid services, sending Spam information, push advertisements or fraudulent information, affect the operation of mobile terminals, endanger Internet network security and other malicious acts of application software. With the popularization of smartphones and the vigorous development of the mobile application industry, mobile malware has flooded into the application market in large numbers. Mobile malware often introduces security vulnerabilities into mobile devices, causing financial losses to users, and causing privacy leaks and other issues. Therefore, estab...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/128H04L9/00H04W12/03H04W12/041G06F21/62G06F21/56G06F21/60
CPCH04L9/008H04W12/02G06F21/602G06F21/6245G06F21/562G06F21/566G06F2221/033H04W12/041H04W12/128
Inventor 王静雯闫峥于熙洵彭立魏文涛
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products