Illegal application software identification method and device, medium and electronic equipment

A technology of application software and identification method, which is applied to electrical components, transmission systems, digital data authentication, etc., can solve the problems of low software identification rate and failure to obtain application type fields, etc., and achieve the effect of improving detection rate and accuracy rate

Pending Publication Date: 2022-01-04
EVERSEC BEIJING TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, generally illegal application software does not strictly follow the national application software filing and development norms, and in many cases it is impossible to obtain the application type field through DPI technology
Moreover, fraudulent applications are usually counterfeited as compliant applications on the market, such as games, instant messaging, etc., which leads to a low recognition rate of illegal application software in the above method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Illegal application software identification method and device, medium and electronic equipment
  • Illegal application software identification method and device, medium and electronic equipment
  • Illegal application software identification method and device, medium and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0028] figure 1 It is a flow chart of a illegal application software identification method according to the embodiment of the present application, and this embodiment can be applied to the case of identifying the illegal application software. The method can be performed by the illegal application software recognition apparatus provided in the present application embodiment, which can be implemented by software and / or hardware, and can be integrated into the electronic device running this system.

[0029] like figure 1 As shown, the illegal application software recognition method includes:

[0030] S110, extract interface access requests in network traffic data, parse the interface access request to obtain domain information of the interface.

[0031] Among them, the network traffic data is passed through the capture tool, which is intercepted to send and receive data packets transmitted in network transmission. Network traffic data may include an interface access request, where...

Embodiment 2

[0065] figure 2 The present application is a flowchart of another method of identifying illegal application software according to a second embodiment. This embodiment will be further optimized based on the above-described embodiments. Specifically optimized according to the characteristics and the target domain name generation rule violation, the pseudo domain to obtain at least two extended-derived domain, comprising: domain according to the domain whitelist and blacklist, determining the domain name generation rule violation; based on the wherein similarity between the domain characteristic fuzzy matching principle, characterized in determining the target candidate and the domain name;; said domain name generation rule violation, generating a set number of candidates domain, and extracts the candidate feature of the domain name the feature similarity domain at the candidate selecting at least two of the domain name is derived.

[0066] like figure 2 As shown in the illegal appl...

Embodiment 3

[0086] image 3 It is an illegal application software identification device provided in the third embodiment of the present application, which may be applied to the case where the illegal application software is identified. The device can be implemented by software and / or hardware and can be integrated into an electronic device such as a smart terminal.

[0087] like image 3 As shown, the apparatus can include: domain name information acquisition module 310, domain name property determining module 320, target feature determination module 330, domain name extension module 340, and illegal application software identification module 350.

[0088] Wherein, the domain information acquisition module 310 is used to extract interface access requests in network traffic data, parse the interface access request to obtain domain name information of the interface;

[0089] The domain name property determines module 320 for determining the domain name attribute of domain names based on domain...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a violation application software identification method and device, a medium and electronic equipment. The method comprises the following steps: extracting an interface access request in network flow data, and analyzing the interface access request to obtain domain name information of an interface; determining a domain name attribute of the domain name according to the domain name information; if the domain name attribute is suspected to be illegal, determining that the domain name is a suspected domain name, and extracting a domain name feature of the suspected domain name as a target feature; according to the target feature and an illegal domain name generation rule, expanding the suspected domain name to obtain at least two derivative domain names; and verifying whether the derivative domain name is a violation domain name, and if yes, identifying violation application software by adopting the violation domain name. By executing the technical scheme, the detection rate and the recognition rate of the illegal application software can be improved.

Description

Technical field [0001] The present application relates to the field of computer applications, in particular, to a illegal application software identification method, device, medium, and electronic device. Background technique [0002] At present, the cases of infringing the legitimate interests of the people implemented through application software (App, Application) continue to high, and severely disrupted social security. In a large number of categories, in large quantity applications, it is important to identify illegal applications such as refuge, which is important for the protection of people's lives and property. [0003] Currently, the general application large-class field of application software is mainly obtained by DPI (Deep Packet Inspection, Depth Packet Detection) technology to implement large class identification of application software. However, general illegal applications are not strictly followed by national application software record development specification...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L61/4511G06F21/44
CPCG06F21/44
Inventor 王肖斌黄晓青高华傅强蔡琳梁彧田野王杰杨满智金红陈晓光
Owner EVERSEC BEIJING TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products