期刊文献+

Android系统恶意程序检测技术研究 被引量:2

Research of malicious program detection technology for Android system
下载PDF
导出
摘要 随着Android系统的不断发展,人们对该平台的安全问题也更为关注。针对Android恶意应用程序存在的安全隐患,提出一种基于事件的恶意程序检测技术。系统采用C/S结构,通过手机客户端获取目标分析程序的系统调用序列,提交服务器端分析处理,分析服务器预先运行大量的已知恶意程序和良性程序作为训练样本,利用支持向量机学习算法对调用序列流进行聚类分类学习,检测出与样本类似特征的恶意程序。实验测试表明,该技术对恶意程序检出率高,误报率低,为Android恶意程序检测系统的设计提供有价值的参考。 With the development of Android system, people are concerned about the security probelem of the platform much more. In view of the hidden security problems of malicious program,a kind of malicious program detection technology based on event is proposed. C/S structure is adopted to abtain the system call sequence of target analysis program by mobile phone client,and submit it to the server for analysis processing,and run the known malicious programs and benign program as training sample. The leaning algorithm of support vector machine is utilized to complete the clustering and classification learning of call sequence flow,making the system identify malicious program similar to the sample characteristic. The result of experiment shows that the technology has a high detection rate and low false positive rate,and can provide valuable reference for design of malicious program detection system.
出处 《现代电子技术》 北大核心 2015年第12期47-50,共4页 Modern Electronics Technique
基金 教育部博士点基金(20126102110036)
关键词 ANDROID 安全问题 恶意程序检测 支持向量机 Android Android system security malicious program detection SVM
  • 相关文献

参考文献8

  • 1I Anon. What Is Android? [EB/OL]. [2012-03-20]. http:// www. cnblogs.com/activi.
  • 2SHABTAI Asaf, FLEDEL Yuval, ELOVICI Yuval. Securing android-powered mobile devices using SELinux [J]. IEEE Secu- rity & Privacy, 2010, 8(3): 36-44.
  • 3ENCK William, ONGTANG MacHigar, MCDANIEL Patrick Understanding android security [J]. IEEE Security & Privacy, 2009, 7(1): 50-57.
  • 4VAPNIK V. N. Statistical learning theory [M]. New York: John Wiley, 1998.
  • 5ZHOU Ya-jin, JIANG Xu-xian. Dissecting Android malware: characterization and evolution [C]// Proceedings of IEEE Sympo- sium on Security and Privacy. Washington DC: IEEE Comput- er Society, 2012: 95-109.
  • 6SHABTAI Asaf, FLEDEL Yuval, KANONOV Uri, et al. Googleandroid: A comprehensive security assessment [I]. IEEE Security & Privacy, 2010, 8(2): 35-44.
  • 7廖明华,郑力明.Android安全机制分析与解决方案初探[J].科学技术与工程,2011,11(26):6350-6355. 被引量:44
  • 8[美]DARCEYLauren,CONDERShane.Android应用开发入门经典[M].袁国忠,译.2版.北京:人民邮电出版社,2012.

二级参考文献9

  • 1Shabtai A, Fledek Y, Kanonov U, et al. Google Android : a comprehen- sive security assessment. IEEE Security & Privacy,2010:35-38.
  • 2Shin W, Kiyomoto S, Fukushima K, et al. A formal model to analyze the permission authorization and enforcement in the android frame- work. International Symposium on Secure Computing (SecureCom- 10) 2010:944-945.
  • 3Enck W, Ongtang M, McDaniel P. Understanding android security. IEEE Security & Privacy, 2009 ;7 (1) :53-54.
  • 4Shin W, Kwak S, Kiyomoto S, et al. A small but non-negligible flaw in the Android permission scheme. IEEE International Symposium on Policies for Distributed Systems and Net-works, 2010:109-110.
  • 5Shabtai A, Wiess Y, Kanonov U, et al. Andromaly : a behavioral mal- ware detection framework for android devices. Intelligent Information Systems, 2011:7-22.
  • 6Shabtai A, Kanonov U, Elovici Y. Detection, alert and responseto ma- licious behavior in mobile devices: knowledge-based approach. RAID, 2009.
  • 7Shabtai A, Kanonov U, Elovici Y. Intrusion Detection on mobile de- vices using the knowledge based temporal-abstraction method. Sys- tems and Software, 2010 ;83 (8) : 1527-1536.
  • 8Shabtai A, Fledel Y, Elovici Y, et al. Using the KBTA method for in- ferring computer and network security alerts from timestamped, raw system metrics. Computer Virology, 2009 ; 8 ( 3 ) : 267-298.
  • 9Shabtai A, Fledel Y, Elovici Y. Securing Android-powered mobile de- vices using SELinux. IEEE Security & Privacy,2010:36-44.

共引文献43

同被引文献11

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部