期刊文献+

Android异常入侵检测中的主动响应系统

Active Response System in Anomalous Intrusion Detection on Android
原文传递
导出
摘要 手机恶意程序有对智能手机用户造成经济损失、数据丢失及隐私泄露等危害。在现有的Android入侵检测系统框架基础上,提出异常入侵检测中的主动响应系统,及时减轻手机恶意软件对用户造成的危害。该主动响应系统采用C/S架构,其中客户端收集手机中应用的程序信息,负责最后的响应措施;服务器端及时静态分析由客户端发来的可执行文件,锁定导致手机出现异常状态的恶意程序。测试结果表明,该系统可以主动对手机上已发现的异常行为做出及时有效响应。 The mobile malicious programs would cause such face hazards economic loss, data loss and privacy leakages, et al. The paper, based on the existing Android intrusion detection systems, proposes the active response system in anomalous intrusion detection, thus to reduce the harm caused by malicious software. The system uses C/S structure, and the client collects the applications information in the smart-phone and is in charge of the response measures. The server analyzes promptly the executable file of applications from the client, finds the malicious programs which cause abnormal conditions to the phone. The experimental results show that this system could make timely and effective response to the abnormal behaviors found in the phone.
出处 《通信技术》 2012年第1期102-104,共3页 Communications Technology
基金 江苏省产学研前瞻性联合研究资助项目(No.BY128)
关键词 ANDROID 恶意程序 主动响应 Android malicious program active response
  • 相关文献

参考文献8

  • 1李恺,刘义铭.智能手机的病毒风险浅析[J].信息安全与通信保密,2009(8):162-164. 被引量:4
  • 2吴新民.基于3G网络安全系统的入侵检测研究[J].通信技术,2010,43(6):98-100. 被引量:5
  • 3王晓波,倪光南.七号信令系统中TUP和ISUP协议的兼容设计[J].计算机研究与发展,1998,35(1):14-18. 被引量:3
  • 4SCHMIDT AUBREY-DERRICK,RAINER BYE,SCHMIDT HANS-GUNTHER,et al.Static Analysis of Executables forCollaborative Malware Detection on Android[J].Deutsche Telekom Laboratories,2009(14-18):53-57.
  • 5MICHAEL B,FREILING F C.Towards Dynamic MalwareAnalysis to Increase Mobile Device Security[EB/OL].(2008-10-12)[2011-03-23].http://www1.informatik.uni-erlangen.de/filepool/publications/towards-dynamic-malware-analysis-to-increase-mobile-device-security.pdf.
  • 6WANG C H T,WU C.A Virus Prevention Model basedon Static Analysis and Data Mining Methods[M].[s.l.]:Computer and Information Technology Workshops,2008:288-293.
  • 7Botha R A,Furnell S M,Clarke N L.From Desktopto Mobile:Examining the Security Experience[J].Computers&Security,2009,28(3-4):130-137.
  • 8丁勇,虞平,龚俭.自动入侵响应系统的研究[J].计算机科学,2003,30(10):160-162. 被引量:11

二级参考文献27

  • 1小蚂蚁.未来手机的“宙斯盾”——安全防护技术[J].信息安全与通信保密,2008(11):21-21. 被引量:1
  • 2金跃辉,李忠玖,张咏林,程时端.七号信令ISUP协议的一致性测试[J].电信科学,1996,12(8):20-24. 被引量:1
  • 3那罡编著.恶意软件侵袭3G智能手机加速病毒发展[N].中国计算机报,200903-09.
  • 4张威编著.GSM网络原理与工程[M].北京:人民邮电出版社,2003.
  • 5网络安全:病毒青睐智能手机-专家教你如何防范[N].北京晨报,2006-06-29.
  • 6专家提醒用户:36时代需警惕智能手机病毒[N].中国新闻网,2009-0508.
  • 7Anderson J P.Computer Security Threat Monitoring and Surveillance[R].Fort Washington,Pennsylvania:[s.n.] ,1980.
  • 8Garvey A,Lunt D.Model based Intrusion Detection[C] //In Proceedings of the 14th National Computer Security Conference.Washington,D.C,USA:National Computer Security Center,1991:372-385.
  • 9Saha D,Mukherjee A.Mobility Support In IP:A Survey of the Related PrototocolS[J].IEEE Network.2004(10):34-40.
  • 10Denis R,Philippe S.Convergence and Competition on the Way Towards 4G[C] //Radio and Wireless Symposium.Long Beach.California:IEEE,2007:277-280.

共引文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部