期刊文献+

一种基于行为分析的Android系统恶意程序检测模型 被引量:4

An Android Malware Detection System Model Based on Behavior Analysis
下载PDF
导出
摘要 随着信息产业的不断发展,Android系统已经占据了大量的市场份额,由于Android系统本身存在漏洞,给恶意程序提供了机会。对传统的检测模型进行分析,提出了一种基于行为分析的Android系统恶意程序检测模型,该模型可以对程序行为的恶意性进行检测分析,根据分析结果对Android系统的权限进行更改,有效地解决权限串谋,提高Android系统检测机制的可靠性,同时也为用户提供了权限,有效预防恶意程序。 With the increasing development of information industry, the Android system has already occupied a large market share. The Android system itself has loopholes and offers opportunities for malicious programs. This paper analyzes the traditional detection model and proposes a Android malware detection system model based on behavior analysis. This model can detect and analyze the testing malicious program behavior. Ac- cording to the analysis results, changes can be made to the Android system permissions. This effectively solves the permissions collusion and improves the detection mechanism of the Android system. At the same time, it also provides users with permissions while effectively preventing malicious programs.
出处 《湖北理工学院学报》 2015年第3期42-46,共5页 Journal of Hubei Polytechnic University
基金 湖北省高校青年教师深入企业项目(项目编号:XD2014671) 湖北省教育厅重点科研项目(项目编号:D20144403) 湖北理工学院优秀青年科技创新团队(项目编号:13xtz10)
关键词 恶意程序 ANDROID系统 预防机制 malicious program android system prevention mechanism
  • 相关文献

参考文献4

二级参考文献37

  • 1Debar H, Dacier M, Wespi A. Toward a taxonomy of intrusion-detection systems. Computer Networks, 1999,31(8):805-822.
  • 2Ye N, Li XY, Chen Q, Emran SM, Xu MM. Probabilistic techniques for intrusion detection based on computer audit data IEEE Trans. on Systems, Man, and Cybernetics-Part A: Systems and Humans, 2001,31(4):266-274.
  • 3Ko C, Fink G, Levitt K. Automated detection of vulnerabilities in privileged programs byexecution monitoring. In: Proc. of the 10th Annual Computer Security Applications Conf Orlando: IEEE Computer Society Press 1994. 134~144.
  • 4Bernaschi M, Gabrielli E, Mancini LV. REMUS: A security-enhanced operating system. ACM Trans. on Information and System Security, 2002,5(1):36-61.
  • 5Goldberg I, Waqner D, Thomas R, Brewer EA. A secure environment for untrusted helper applications. In: Proc. of the 6th USENIX UNIX Security Symp San Jose: USENIX, 1996. 1-13.
  • 6Marty R. Snort-Lightweight intrusion detection for networks In: Proc. of the 13th Conf. on Systems Administration. Washington:USENIX, 1999.229-238.
  • 7Warrender C, Forrest S, Pearlmutter B. Detecting intrusions using system calls:alternative data models. In: Proc. of the 1999 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society Press, 1999. 133~145.
  • 8Hofmeyr SA, Forrest S, Somayaji A. Intrusion detection using sequences of system calls Journal of Computer Security, 1998,6(3):151-180.
  • 9Lee W, Stolfo S J, Chan PK, Eskin E, Fan W, Miller M, Hershkop S, 2hang J. Real time data mining-based intrusion detection. In:Proc. of the 2nd DARPA Information Survivability Conf & Exposition II. Anaheim: IEEE Computer Society Press, 2001.89 ~100.
  • 10Lee SC, Heinbuch DV. Training a neural-network based intrusion detector to recognize novel attacks, IEEE Trans. on Systems,Man, and Cybernetics-Part A: Systems and Humans, 2001,31(4):294-299.

共引文献64

同被引文献17

引证文献4

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部