Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Dynamic detection method for android malicious software based on mimicry of enhanced deep learning

A technology for dynamic detection and malicious software, applied in neural learning methods, computer security devices, biological neural network models, etc., can solve severe mobile network security issues, achieve enhanced anti-attack performance, enhanced anti-attack performance, and improved defense performance Effect

Pending Publication Date: 2021-08-27
SHENYANG AEROSPACE UNIVERSITY
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In response to the above situation, although a variety of Android malware detection methods have been proposed in recent years, with the continuous increase in the number of Android malware and the continuous upgrading of attack methods, the current situation of mobile network security is still very severe.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dynamic detection method for android malicious software based on mimicry of enhanced deep learning
  • Dynamic detection method for android malicious software based on mimicry of enhanced deep learning
  • Dynamic detection method for android malicious software based on mimicry of enhanced deep learning

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0086] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present invention. Rather, they are merely examples of systems consistent with aspects of the invention as recited in the appended claims.

[0087] In the prior art, common Android malware detection methods include the Android malware static detection method: it is not necessary to actually run the Android software, and usually only needs to collect static features as the input features of the detection model; the Android malware dynamic detection method: The runtime characteristics of Android software are required as the input features of the detec...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a dynamic detection method for android malicious software based on an enhanced deep learning mimicry. In the method, an android malicious software dynamic detection model based on the enhanced deep learning mimicry is constructed; and based on the model, the method comprises the following steps: carrying out data preprocessing on input data, and then inputting the preprocessed data into a heterogeneous redundant model structure, wherein the heterogeneous redundant model structure comprises three heterogeneous redundant bodies with equivalent functions, and the three heterogeneous redundant bodies are respectively an enhanced Long Short Term Memory Network (LSTM) model, an enhanced Gated Recurrent Unit (GRU) model and an enhanced capsule network model. According to the method provided by the invention, in the android malicious software dynamic detection model based on the mimicry architecture, the mimicry architecture and the mimicry defense principle are utilized, so that the model can autonomously defend the attack of the network, and the defensive performance of the model is enhanced.

Description

technical field [0001] The disclosure of the present invention relates to the technical field of mobile Internet security, in particular to a dynamic detection method for Android malware based on enhanced deep learning mimicry. Background technique [0002] In recent years, the Android operating system has gained popularity due to the open nature of the Android framework. With the widespread use of the Android operating system, the number of Android software has also increased significantly. The rapid development of Android software has made lawbreakers turn their attention to the Android software development market, using Android malicious software to steal the privacy of Android users and seek illegal benefits. While the number of Android software is increasing, the amount of Android malware is also increasing year by year. [0003] While the number of Android malware has grown rapidly, its evasion techniques have also developed rapidly in recent years. In 2020, Google ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56G06N3/04G06N3/08
CPCG06F21/566G06N3/08G06N3/044G06N3/045
Inventor 郭薇张国栋周翰逊陈晨
Owner SHENYANG AEROSPACE UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products