期刊文献+

基于异常流量监测的智能手机恶意软件检测研究 被引量:1

Research of Smart Phone Malware Detection Based on Anomaly Data Flow Monitoring
下载PDF
导出
摘要 迅速发展的智能手机及移动通信技术在给人们带来极大便利和体验提升的同时,也带来了新的安全问题。总结了智能手机恶意软件的突出特点及危害和当前反恶意软件的发展状况,并结合设备及网络特点,提出了一种基于统计拟合方法的智能手机异常流量与恶意软件检测方法。该方法实时监控设备流量消耗情况,并以正常流量消耗的统计拟合曲线作为标准进行比对。仿真结果表明:该方法可以有效检测出异常流量。 The rapid development of Smart Phone and Mobile Communication Technology not only brings terrific convenience and extraordinary user experience,but also creates new secure issues.This paper summarizes the Smart Phone viruses’characteristic and harm and proposes a Smart Phone anomaly data flow and application detection method based on statistical fit,which collects the dataflow and compare them to the fitting curve in real time.The simulation results show that the method proposed in paper can detect the anomaly data flow effectively.
出处 《计算机安全》 2012年第9期11-14,18,共5页 Network & Computer Security
关键词 异常流量检测 统计拟合 韦布尔分布 智能手机 恶意软件检测 anomaly data flow monitoring Weibull distribution statistical fit Smart Phone malware detection
  • 相关文献

参考文献5

  • 1中国互联网络信息中心.中国移动互联网发展状况调查报告[R/OL].(2012.3.29)[2012.4.21].http://www.cnnic.cn/research/bgxz/ydhlwbg/201203/GO120329-24505.html.
  • 2Bryan Dixon, Shivakant Mishra. Rootkit and Malware Oetection in Sm&rtphones: 2010 International Conference on Dependable Systems and Networks Workshops, 2010[C]. Chicago, IL, USA: 162-163.
  • 3吴俊军,方明伟,张新访.基于启发式行为监测的手机病毒防治研究[J].计算机工程与科学,2010,32(1):35-38. 被引量:14
  • 4Shuaifu Dai, Y&xin Liu, Tielei Wang et al. Beh&vior- Based Malware Detection on Mobile Phone: Wireless Communications Networking and Mobile Computing (WiCOM), 2010 6th International Conference on, 2010[C]. 1-4.
  • 5An Android Application Sandbox System for Suspicious Software Detection: Malicious and Unwanted Software (MALWARE), 2010 5th International Conference on, 2010[C]. 55-62.

二级参考文献12

  • 1谭小彬,王卫平,奚宏生,殷保群.基于隐马尔可夫模型的异常检测[J].小型微型计算机系统,2004,25(8):1546-1549. 被引量:10
  • 2李志,王延巍,朱林.手机病毒的现状与未来[J].电信技术,2006(3):87-90. 被引量:16
  • 3陈建民,张健,曹鹏.手机病毒的发展趋势与防范对策[J].信息网络安全,2006(11):52-55. 被引量:4
  • 4Dagon D, Martin T, Stamer T. Mobile Phones as Computing Devices.. The Viruses Are Coming! [C]//Pro of IEEE Pervasive Computing, 2004:11-15.
  • 5Cheng J,Song S H Y,Yang H,et al. SmartSiren: Virus Detection and Alert for Smartphones[C] //Pro of Mobisys' 07, 2007: 258-271.
  • 6Toyssy S, Helenius M. About Malicious Software in Smartphones[J]. Computer Virology,2006, 2(2) : 109-119.
  • 7Bose A, Shin K G. On Mobile Viruses Exploiting Messaging and Bluetooth Services[C]//Proc of SeeureComm '06,2006 : 322-331.
  • 8Szor P. The Art of Computer Virus Research and Defense[M]. Addison Wesley Professional,2005.
  • 9Teck S Y, Hong T E. A Mobile Phone Malicious Software Detection Model with Behavior Checker[C] //Proc of HSI' 05,2005 : 57-65.
  • 10Qiao Y, Xin X W, Bin Y,et al. Anomaly Intrusion Detection Method Based on HMM[J]. Electronics Letters,2002, 38(13).-663-664.

共引文献13

同被引文献2

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部