期刊文献+

Android系统应用权限异常检测技术研究 被引量:3

Research on application of anomaly detection technology in Android system
下载PDF
导出
摘要 在安卓系统中,一个应用的申请的权限往往能反应出这个应用的行为模式。而一个恶意应用的出现,是需要多个权限配合的。本文针对Android平台恶意应用泛滥的问题,通过对Apriroi算法进行研究改进,寻找恶意应用申请权限之间的关联性,挖掘它们之间的关系,判断应用的恶意性,为Android用户提供安全保障。并通大量实验数据以及与其它方法进行比较得出,本文提出的方法的准确率高达78.6%,能够较为准确的判断出一个应用是否是恶意应用。 In the Android system,a app requests permission's action can know the app's behaviorpatterns.But the coming of Malicious applications need work in with many permissions.The article uses the Apriori algorithm exhumes the association of permission for every App requests to research the App's Malicious nature.If the App is harmful,then it can give the user a tips.Then,article throughs a lot of experimental data and compare with other ways to get the result that our ways' accuracy is 78.6%.So,itcan be more accurate to determine whether an application is malicious applications.
出处 《电子设计工程》 2017年第22期85-88,共4页 Electronic Design Engineering
关键词 权限 安全 安卓 APRIORI算法 permissions security Android Apriori algorithm
  • 相关文献

参考文献2

二级参考文献30

  • 1Shabtai A, Fledek Y, Kanonov U, et al. Google Android : a comprehen- sive security assessment. IEEE Security & Privacy,2010:35-38.
  • 2Shin W, Kiyomoto S, Fukushima K, et al. A formal model to analyze the permission authorization and enforcement in the android frame- work. International Symposium on Secure Computing (SecureCom- 10) 2010:944-945.
  • 3Enck W, Ongtang M, McDaniel P. Understanding android security. IEEE Security & Privacy, 2009 ;7 (1) :53-54.
  • 4Shin W, Kwak S, Kiyomoto S, et al. A small but non-negligible flaw in the Android permission scheme. IEEE International Symposium on Policies for Distributed Systems and Net-works, 2010:109-110.
  • 5Shabtai A, Wiess Y, Kanonov U, et al. Andromaly : a behavioral mal- ware detection framework for android devices. Intelligent Information Systems, 2011:7-22.
  • 6Shabtai A, Kanonov U, Elovici Y. Detection, alert and responseto ma- licious behavior in mobile devices: knowledge-based approach. RAID, 2009.
  • 7Shabtai A, Kanonov U, Elovici Y. Intrusion Detection on mobile de- vices using the knowledge based temporal-abstraction method. Sys- tems and Software, 2010 ;83 (8) : 1527-1536.
  • 8Shabtai A, Fledel Y, Elovici Y, et al. Using the KBTA method for in- ferring computer and network security alerts from timestamped, raw system metrics. Computer Virology, 2009 ; 8 ( 3 ) : 267-298.
  • 9Shabtai A, Fledel Y, Elovici Y. Securing Android-powered mobile de- vices using SELinux. IEEE Security & Privacy,2010:36-44.
  • 10Agrawal R, Imielinski T, Swami A N. Mining association rules between sets of items in large databases//Proceedings of the ACM SIGMOD the International Conference on Man agement of Data. Vienna, Austria, 1993:297-216.

共引文献71

同被引文献41

引证文献3

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部