期刊文献+

基于SVM的敏感权限Android恶意软件检测方法

SVM Method of Detecting Android Malicious Software Based on Sensitive Permissions
下载PDF
导出
摘要 Android系统使用权限机制来控制其应用程序访问系统资源和用户的隐私信息,因此,Android应用程序所申请的权限与其行为关系紧密,通过分析权限信息可以有效地检测Android恶意软件。本文提出了一种基于敏感权限的Android恶意软件SVM检测方法,通过恶意软件逆向分析,统计分析两库中各个权限的出现频率和恶意软件库中的敏感权限,构建恶意软件与非恶意软件权限特征库。最后,通过SVM方法建立检测模型有效地对恶意软件进行判断。 Android system uses permission mechanism to control the application access to system resources and users' a private information,therefore,the permissions applied for by Android application programs is closely related to their behaviors. Through the analysis of authority information can effectively detect Android malicious software. This paper proposes a kind of SVM method of detecting Android malicious software. By malicious software reverse analysis,statistical analysis of the frequency of each authority in the two banks and the sensitive permissions of malicious software,we are to construct software access feature database of malicious software and non-malicious software. Finally,by using the SVM method,we are to establish the detection model to judge the malicious software effectively.
出处 《景德镇学院学报》 2016年第6期27-30,共4页 Journal of JingDeZhen University
基金 安徽新华学院2014年度校级课题"算法分析与设计教学改革"的研究成果(2014jgkcx13)
关键词 ANDROID 敏感权限特征 恶意检测 SVM Android sensitive permissions feature malicious detection SVM
  • 相关文献

参考文献4

二级参考文献44

  • 1Shabtai A, Fledek Y, Kanonov U, et al. Google android:a comprehensive security assessment. IEEE Security & Privacy, 2010.
  • 2符易阳周丹平.Android安全机制分析.第26次全国计算机安全学术交流会论文集.2011.
  • 3期廖明华,郑力明.Android安全机制分析与解决方案初探.科学技术与工程,2009,26(11):6351-6354.
  • 4Enck W,Ongtang M,McDaniel P. Understanding android security. IEEE Security & Piracy, 2009,7(1):53-54.
  • 5Shabtai A, Wiess Y, Kanonov U, et al. Andromaly:a behavioral malware detection framework for Android devices. Intelligent Information Systems,2011.
  • 6Shabtai A, Kanonov U, Elovici Y. Detection, alert and responseto malicious behavior in mobile devices: knowledge- based approach.RAID, 2009.
  • 7Shabtai A, Kanonov U, Elovici Y. Intrusion detection on mobile devices using the knowledge based temporal-abstraction method. Systems and Software,2010,83(8):l 527-1 536.
  • 8Shabtai A, Fledel Y, Elovici Y, et al. Using the KBTA method for inferring computer and network security alerts from timestamped,rawsystem metrics. Computer Virology, 2009,8 (3): 267-298.
  • 9Davi L, Dmitrienko A, Sadeghi A-R, et al. Privilege escalation attacks on Android. Proceedings of the 13th Information Security Conference (ISC),2010.
  • 10Enck W, Ongtang M, McDaniel P. Mitigating android software misuse before it happens. Technical Report NAS-TR-0094-2008, Pennsylvania State University, 2008.

共引文献81

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部