期刊文献+

基于随机森林算法的Android恶意代码特征分析 被引量:1

Analysis of Android Malicious Code Based on Random Forest Algorithm
下载PDF
导出
摘要 针对Android恶意代码泛滥问题。文中提取出Android的权限特征,采用随机森林算法对应用特征进行匹配训练,从原始训练集中,有放回地抽取一定数量的样本,作为根节点并开始不断进行训练。直到所有节点都被遍历或训练结束,从而实现特征叶子节点与案例库中的特征匹配。实验分析结果表明,从选择的算法效果来看,准备率实验结果表明,在权限特征维度上,随机森林算法的表现都比普通常规算法好;从误报率上来看,随机森林算法的效果同样较普通算法要好。但是,随机森林算法在60维之前的漏报率表现略显不足。所以,为了构建权限特征的检测模块,最终选择随机森林算法和后60维的权限特征。 Android malicious code for the problem. This paper first extracts the authority features of Android,then uses the Random Forests Algorithm( RF) to match the application characteristics. From the original training set,there is a certain number of samples,as the root node and starting to train continuously Until all nodes are traversed,or the training is completed,so that the characteristic leaf node matches the feature in the case library. The results of the experimental results show that the experimental results show that the performance of the random forest algorithm is better than that of the conventional conventional algorithm in terms of the effect of the selected algorithm.From the point of view of the false positive rate,the effect of the random forest algorithm is the same Better than normal algorithms. However,the random forest algorithm in the 60-dimensional false negative rate before the performance of slightly less than. So,in order to build the detection module of the privilege feature,finally chose the random forest algorithm and the posterior 60-dimensional permission feature.
作者 刘贺翔 李英娜 张长胜 任小波 李川 LIU Hexiang;LI Yingna;ZHANG Changsheng;REN Xiaobo;LI Chuan(School of Information Engineering and Automation,Kunming University of Science and Technology,Kunming 650500,China)
出处 《电子科技》 2018年第5期28-32,共5页 Electronic Science and Technology
基金 国家自然科学基金(KKGD201503106) 云南电网有限责任公司电力科学研究院项目(2015-000303JL00018)
关键词 ANDROID 恶意代码 随机森林算法 Android malicious code random torest algorithm
  • 相关文献

参考文献9

二级参考文献73

  • 1赵树鹏,陈贞翔,彭立志.基于流中前5个包的在线流量分类特征[J].济南大学学报(自然科学版),2012,26(2):156-160. 被引量:3
  • 2张华伟,王明文,甘丽新.基于随机森林的文本分类模型研究[J].山东大学学报(理学版),2006,41(3):5-9. 被引量:57
  • 3董聪.多层前向网络的全局最优化问题[J].大自然探索,1996,15(4):27-31. 被引量:20
  • 4李勇,左志宏.目标代码混淆技术综述[J].计算机技术与发展,2007,17(4):125-127. 被引量:10
  • 5AKYILDIZ I, WANG Xudong, AND WANG Weilin. Wireless Mesh Networks: A Survey [J]. Computer Networks, 2005, 47(4): 445-487.
  • 6LOU Wenjing, REN Kui. Security, Privacy, and Accountability in Wireless Access Networks[J]. IEEE Wireless Communications Magazine, 2009, 16(4): 80-87.
  • 7ZHANG Zonghua, HO Pinan, FARID N. RADAR: A Reputation-Driven Anomaly Detection System for Wireless Mesh Networks [J]. Wireless Networks, 2010, 16(8): 2221- 2236.
  • 8LU W, SUNDARESHAN M. A Model for Multilevel Security in Computer Networks[J]. IEEE Transactions on Software Engineering, 1990, 16(6): 647-659.
  • 9LI Ze, SHEN Haiying. A Hierarchical Account-Aided Reputation Management System for Large-Scale MANETs [C]//Proceedings of INFOCOM: April 10-15, 2011, Shang Hai. IEEE Press, 2011: 909-917.
  • 10YAN Zheng, CHEN Yu. AdContRep: A Privacy Enhanced Reputation System for MANET Content Services [C]// Proceedings of the 7th International Conference on Ubiquitous Intelligence and Computing. Springer-Verlag, LNCS 6406/2010: 414-429.

共引文献278

同被引文献21

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部