CN109598120A - Security postures intelligent analysis method, device and the storage medium of mobile terminal - Google Patents

Security postures intelligent analysis method, device and the storage medium of mobile terminal Download PDF

Info

Publication number
CN109598120A
CN109598120A CN201811356911.2A CN201811356911A CN109598120A CN 109598120 A CN109598120 A CN 109598120A CN 201811356911 A CN201811356911 A CN 201811356911A CN 109598120 A CN109598120 A CN 109598120A
Authority
CN
China
Prior art keywords
mobile terminal
security postures
security
data
analysis
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811356911.2A
Other languages
Chinese (zh)
Inventor
万巍
龙春
申罕骥
赵静
杨帆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Computer Network Information Center of CAS
Original Assignee
Computer Network Information Center of CAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Computer Network Information Center of CAS filed Critical Computer Network Information Center of CAS
Priority to CN201811356911.2A priority Critical patent/CN109598120A/en
Publication of CN109598120A publication Critical patent/CN109598120A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The embodiment of the invention discloses security postures intelligent analysis method, device and the storage mediums of a kind of mobile terminal, are related to network technique field.The method comprise the steps that obtaining the marked security postures data of mobile terminal, the marked security postures data include mobile terminal abnormal behaviour data, mobile terminal potential threat data or running of mobile terminal situation data;Extract the corresponding security postures feature of the marked security postures data;Based on the security postures feature, security postures analysis model is trained;The security postures analysis model obtained by training carries out security postures analysis to mobile terminal.The present invention is able to ascend the network security defence capability of mobile terminal.

Description

Security postures intelligent analysis method, device and the storage medium of mobile terminal
Technical field
The present invention relates to the security postures intelligent analysis methods of network technique field more particularly to a kind of mobile terminal, dress It sets and storage medium.
Background technique
With the continuous development of network technology, the use of mobile terminal is also increasingly popularized, and it is not retrievable general to become user It is equipped all over using.The analysis of the network safety situation of mobile terminal and the acquisition of potential risk hidden danger also become urgently to be resolved Problem.Currently, mobile terminal under different application scene there are different risk hidden danger, the type of security risk is more, and situation It is complicated, it is difficult to which that comprehensive analysis in real time is carried out to the Network Situation of mobile terminal.
Summary of the invention
The embodiment of the present invention provides security postures intelligent analysis method, device and the storage medium of a kind of mobile terminal, It is able to solve the problem of can not carrying out comprehensive analysis to the security postures that mobile terminal carries out.
In order to achieve the above objectives, the embodiment of the present invention adopts the following technical scheme that
In a first aspect, the embodiment of the present invention provides a kind of security postures intelligent analysis method of mobile terminal, comprising:
The marked security postures data of mobile terminal are obtained, the marked security postures data include that mobile terminal is different Normal behavioral data, mobile terminal potential threat data or running of mobile terminal situation data;
Extract the corresponding security postures feature of the marked security postures data;
Based on the security postures feature, security postures analysis model is trained;
The security postures analysis model obtained by training carries out security postures analysis to mobile terminal.
With reference to first aspect, in the first possible implementation of the first aspect, the peace obtained by training Full Study on Trend model carries out security postures analysis to mobile terminal, comprising:
The security postures analysis model obtained by training carries out security postures analysis to mobile terminal, obtains safe state Potential analysis grade, the security postures analytical grade include: high-risk situation, middle danger situation, low danger situation or security postures.
With reference to first aspect, in the second possible implementation of the first aspect, the method also includes:
Based on the security postures analysis to mobile terminal as a result, push security threat data and/or warning information data.
The possible implementation of second with reference to first aspect, in the third possible implementation of first aspect In, the method also includes:
To the analysis of the security postures of the mobile terminal as a result, and the security threat data and/or warning information number According to being visualized;
Wherein, the content of the visual presentation further includes following any one or any combination: capture in predetermined period Mobile terminal safety total number of events, security incident quantity category statistics, security incident quantity by threat degree statistics, safety Early warning notification sum, safe early warning are notified to category statistics, mobile terminal liveness ranking, mobile terminal press the use feelings in region Condition statistics, app installation situation ranking, terminal security situation statistics, high-risk terminal ranking.
With reference to first aspect, in a fourth possible implementation of the first aspect, the peace obtained by training Full Study on Trend model carries out security postures analysis to mobile terminal, comprising:
Obtain the mobile terminal data, the mobile terminal data includes that the user information of mobile terminal, movement are soft or hard Part resource, system log, using log, alarm log and error log;
The mobile terminal data is inputted into the security postures analysis model that the training obtains, is obtained to described mobile whole The security postures at end analyze result.
Second aspect, the embodiment of the present invention provide a kind of security postures intellectual analysis device of mobile terminal, comprising:
Module is obtained, for obtaining the marked security postures data of mobile terminal, the marked security postures data Including mobile terminal abnormal behaviour data, mobile terminal potential threat data or running of mobile terminal situation data;
Extraction module, for extracting the corresponding security postures feature of the marked security postures data;
Training module is trained security postures analysis model for being based on the security postures feature;
Analysis module, the security postures analysis model for being obtained by training carry out security postures point to mobile terminal Analysis.
In conjunction with second aspect, in the first possible implementation of the second aspect,
The analysis module is also used to the security postures analysis model obtained by training, carries out safety to mobile terminal Study on Trend, obtains security postures analytical grade, and the security postures analytical grade includes: high-risk situation, middle danger situation, low danger Situation or security postures.
In conjunction with second aspect, in a second possible implementation of the second aspect, described device further include:
Pushing module, for based on the security postures analysis to mobile terminal as a result, push security threat data and/or pre- Alert information data.
In conjunction with second of possible implementation of second aspect, in the third possible implementation of second aspect In, described device further include:
Display module, for the mobile terminal security postures analysis as a result, and the security threat data and/ Or warning information data are visualized;Wherein, the content of the visual presentation further includes following any one or appoints Meaning combination: mobile terminal safety total number of events, the security incident quantity category statistics, security incident number captured in predetermined period Amount by threat degree statistics, safe early warning notification sum, safe early warning notification category statistics, mobile terminal liveness ranking, Service condition statistics, app installation situation ranking, terminal security situation statistics, high-risk terminal ranking of the mobile terminal by region.
In conjunction with second aspect, in the fourth possible implementation of the second aspect,
The analysis module, is also used to obtain the mobile terminal data, and the mobile terminal data includes mobile terminal User information, mobile software and hardware resources, system log, using log, alarm log and error log;And by the movement Terminal data inputs the security postures analysis model that the training obtains, and obtains the security postures analysis knot to the mobile terminal Fruit.
The third aspect, the embodiment of the present invention provide a kind of computer readable storage medium, are stored thereon with computer journey Sequence, which is characterized in that the step of method that first aspect provides is realized when described program is executed by processor.
Security postures intelligent analysis method, device and the storage medium of mobile terminal provided in an embodiment of the present invention, pass through The marked security postures data of mobile terminal are obtained, the marked security postures data include mobile terminal abnormal behaviour number According to, mobile terminal potential threat data or running of mobile terminal situation data;It is corresponding to extract the marked security postures data Security postures feature;Based on the security postures feature, security postures analysis model is trained;It is obtained by training Security postures analysis model carries out security postures analysis to mobile terminal.Mobile terminal can be analyzed to obtain under different scenes Incidence relation between feature extracts the status assessment standard with differentiation for different application scene, realize it is complicated, The security postures perception and security risk prediction of mobile terminal, disclose propagation of the security incident in terminal network under changeable scene Rule;Meanwhile the real-time push of terminal data is realized by terminal data acquisition interface, it is mobile whole in active analysis different scenes The safe condition situation of change at end realizes that multi-source, the effective interactive and global of multidimensional information are shown, provides whole day for mobile terminal Time, multi-faceted network security monitoring and emergency response, promote the network security defence capability of mobile terminal.
Detailed description of the invention
It to describe the technical solutions in the embodiments of the present invention more clearly, below will be to needed in the embodiment Attached drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for ability For the those of ordinary skill of domain, without creative efforts, it can also be obtained according to these attached drawings other attached Figure.
Fig. 1 is the flow diagram of the security postures intelligent analysis method of the mobile terminal of the embodiment of the present invention;
Fig. 2 is another flow diagram of the security postures intelligent analysis method of the mobile terminal of the embodiment of the present invention;
Fig. 3 is the security postures intellectual analysis apparatus structure schematic diagram of the mobile terminal of the embodiment of the present invention;
Fig. 4 is another structural schematic diagram of the security postures intellectual analysis device of the mobile terminal of the embodiment of the present invention;
Fig. 5 is the structural schematic diagram of the security postures intellectual analysis device 500 of the mobile terminal of the embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts all other Embodiment shall fall within the protection scope of the present invention.
One embodiment of the invention provides a kind of security postures intelligent analysis method of mobile terminal, as shown in Figure 1, the side Method includes:
101, the marked security postures data of mobile terminal are obtained, the marked security postures data include mobile whole Hold abnormal behaviour data, mobile terminal potential threat data or running of mobile terminal situation data.
102, the corresponding security postures feature of the marked security postures data is extracted.
103, it is based on the security postures feature, security postures analysis model is trained.
104, the security postures analysis model obtained by training carries out security postures analysis to mobile terminal.
It is based on the self-characteristic and network characteristic of mobile terminal in more scenes, acquisition is related for the embodiment of the present invention Information of terminal user, system log, using the mass datas such as log, terminal software and hardware resources, alarm and error log carry out Operation situation, fragility, risk etc. of the method for depth analysis, research and utilization data mining and machine learning from mobile terminal Different dimensions extract the secure data characteristic information of mobile terminal, and extracting for different application scene and networking rule has The status assessment standard of differentiation is classified using secure data of the big data point technology to different characteristic, is clustered, in terminal Correlation rule is formed between secure data, using technologies such as machine learning and association analysis, realize mobile terminal multiple risk because The analysis of element is traced, is traced to the source, and discloses security incident in terminal in propagation law, and then analyze mobile terminal general safety Situation and threat trend prediction, disclose propagation law of the security incident in terminal network, mention for the unified control of intelligent terminal For round-the-clock, multi-faceted safety guarantee.
Compared with prior art, the embodiment of the present invention analyzes to obtain mobile terminal in the association under different scenes between feature Relationship extracts the status assessment standard with differentiation for different application scene, realizes and moves under complicated, changeable scene The security postures perception and security risk prediction of terminal, disclose propagation law of the security incident in terminal network;Meanwhile passing through Terminal data acquisition interface realizes the real-time push of terminal data, and the safe condition of mobile terminal becomes in active analysis different scenes Change situation, realizes that multi-source, the effective interactive and global of multidimensional information are shown, round-the-clock, multi-faceted net is provided for mobile terminal Network security monitoring and emergency response promote the network security defence capability of mobile terminal.
Further embodiment of this invention provides a kind of security postures intelligent analysis method of mobile terminal, as shown in Fig. 2, described Method includes:
201, the marked security postures data of mobile terminal are obtained, the marked security postures data include mobile whole Hold abnormal behaviour data, mobile terminal potential threat data or running of mobile terminal situation data.
202, the corresponding security postures feature of the marked security postures data is extracted.
203, it is based on the security postures feature, security postures analysis model is trained.
Wherein, security postures analysis model is the foundation using safety index as assessment, from multiple dimensions (such as fragile dimension Degree, Risk Dimensions, threat dimension etc.) terminal security situation is described, by terminal security situation with quantitative evaluation result Form is presented.In addition, in addition to security postures value to be generated reflect mobile terminal whether safety other than, it is also necessary to have corresponding assessment Method, cooperation security postures value tell what kind of safety problem may occur for network administrator, provide can for reference, believable comment Estimate probability, has prevent and protecting operation for target, and provide corresponding solution.
For in real time, efficiently and accurately perceive mobile terminal safety situation, utilize the local weighted support based on machine learning Vector regression algorithm, to the user information of mobile terminal, mobile terminal self-information, system log, running log, alarm and mistake Accidentally the secure datas such as log are associated analyzes with merger, and there are the security information of internal association for integration, forms self study safety Situation feature database.
204, the security postures analysis model obtained by training carries out security postures analysis to mobile terminal, is pacified Full Study on Trend grade.
Wherein, the security postures analytical grade includes: high-risk situation, middle danger situation, low danger situation or security postures. In embodiments of the present invention, high-risk rank represents mobile terminal safety situation and is in high state of necessity, it is proposed that takes phase immediately Measure is answered to repair security risk existing for it;Middle danger rank represents mobile terminal safety situation and is in medium critical shape State, it is proposed that corresponding measure is taken to repair its security risk;Low danger rank represents mobile terminal safety situation and is in low danger Dangerous state;Safety representatives mobile terminal is currently in safe condition.
Optionally, step 204 can specifically include: obtain the mobile terminal data, the mobile terminal data includes The user information of mobile terminal moves software and hardware resources, system log, using log, alarm log and error log;By institute It states mobile terminal data and inputs the security postures analysis model that the training obtains, obtain the security postures to the mobile terminal Analyze result.
For the embodiment of the present invention, security incident monitoring data interface is responsible for receiving the safety from terminal data Intelligent treatment The terminal securities event-monitoring data such as event, alarm and error-logging information find all kinds of peaces of terminal using analysis result in time Total event, and quick search and positioning can be carried out to all kinds of security incidents of terminal.
Received security incident monitoring data includes but is not limited to: Time To Event, event type, event title, thing Part grade (basic, normal, high), affiliated unit, cell-phone number, IP address, Event origin, alarm time of origin, alarm/type of error, Problem program alerts source (terminal manages the security protections class App such as app, 360 mobile guards, Tencent mobile phone manager), is interior in detail Appearance and other error-logging informations etc..
205, based on the security postures analysis to mobile terminal as a result, push security threat data and/or warning information number According to.
For the embodiment of the present invention, safety push is responsible for receiving the peace from terminal data Intelligent treatment with warning data interface Full threat and warning information data carry out the front end push of control platform to potential security threat and early warning are shown.
Received safety push includes but is not limited to warning data: when phone number, IP address, affiliated unit, notification Between, notification title, circulation scope, notification source, notification state (wait notify, notified, it is to be processed, processing in, be completed) etc..
206, to the analysis of the security postures of the mobile terminal as a result, and the security threat data and/or early warning believe Breath data are visualized.
Wherein, the content of the visual presentation further includes following any one or any combination: capture in predetermined period Mobile terminal safety total number of events, security incident quantity category statistics, security incident quantity by threat degree statistics, safety Early warning notification sum, safe early warning are notified to category statistics, mobile terminal liveness ranking, mobile terminal press the use feelings in region Condition statistics, app installation situation ranking, terminal security situation statistics, high-risk terminal ranking.
For the embodiment of the present invention, statistical report form data-interface is responsible for receiving after terminal data Intelligent treatment mining analysis Terminal security statistical data, and visualized in the form of daily paper, weekly, monthly magazine, annual report etc..
Compared with prior art, the embodiment of the present invention analyzes to obtain mobile terminal in the association under different scenes between feature Relationship extracts the status assessment standard with differentiation for different application scene, realizes and moves under complicated, changeable scene The security postures perception and security risk prediction of terminal, disclose propagation law of the security incident in terminal network;Meanwhile passing through Terminal data acquisition interface realizes the real-time push of terminal data, and the safe condition of mobile terminal becomes in active analysis different scenes Change situation, realizes that multi-source, the effective interactive and global of multidimensional information are shown, round-the-clock, multi-faceted net is provided for mobile terminal Network security monitoring and emergency response promote the network security defence capability of mobile terminal.
Further embodiment of this invention provides a kind of security postures intellectual analysis device of mobile terminal, as shown in figure 3, described Device includes:
Module 31 is obtained, for obtaining the marked security postures data of mobile terminal, the marked security postures number According to including mobile terminal abnormal behaviour data, mobile terminal potential threat data or running of mobile terminal situation data;
Extraction module 32, for extracting the corresponding security postures feature of the marked security postures data;
Training module 33 is trained security postures analysis model for being based on the security postures feature;
Analysis module 34, the security postures analysis model for being obtained by training carry out security postures to mobile terminal Analysis.
The analysis module 34 is also used to the security postures analysis model obtained by training, pacifies to mobile terminal Full Study on Trend, obtains security postures analytical grade, and the security postures analytical grade includes: high-risk situation, middle danger situation, low Situation of endangering or security postures.
Further, as shown in figure 4, described device further include:
Pushing module 41, for based on to mobile terminal security postures analysis as a result, push security threat data and/or Warning information data.
Display module 42 is analyzed for the security postures to the mobile terminal as a result, and the security threat data And/or warning information data are visualized;Wherein, the content of the visual presentation further include following any one or Any combination: mobile terminal safety total number of events, the security incident quantity category statistics, security incident captured in predetermined period Quantity is by threat degree statistics, safe early warning notification sum, safe early warning notification category statistics, mobile terminal liveness row Name, mobile terminal are arranged by the service condition statistics, app installation situation ranking, terminal security situation statistics, high-risk terminal in region Name.
The analysis module 34, is also used to obtain the mobile terminal data, and the mobile terminal data includes mobile whole The user information at end moves software and hardware resources, system log, using log, alarm log and error log;And by the shifting Dynamic terminal data inputs the security postures analysis model that the training obtains, and obtains the security postures analysis to the mobile terminal As a result.
Compared with prior art, the embodiment of the present invention analyzes to obtain mobile terminal in the association under different scenes between feature Relationship extracts the status assessment standard with differentiation for different application scene, realizes and moves under complicated, changeable scene The security postures perception and security risk prediction of terminal, disclose propagation law of the security incident in terminal network;Meanwhile passing through Terminal data acquisition interface realizes the real-time push of terminal data, and the safe condition of mobile terminal becomes in active analysis different scenes Change situation, realizes that multi-source, the effective interactive and global of multidimensional information are shown, round-the-clock, multi-faceted net is provided for mobile terminal Network security monitoring and emergency response promote the network security defence capability of mobile terminal.
The embodiment of the present invention also provides another computer readable storage medium, which can be Computer readable storage medium included in memory in above-described embodiment;It is also possible to individualism, eventually without supplying Computer readable storage medium in end.The computer-readable recording medium storage has one or more than one program, institute State that one or more than one program by one or more than one processor are used to execute Fig. 1, embodiment illustrated in fig. 2 provides Mobile terminal security postures intelligent analysis method.
The side of above-mentioned offer may be implemented in the security postures intellectual analysis device of mobile terminal provided in an embodiment of the present invention Method embodiment, concrete function realize the explanation referred in embodiment of the method, and details are not described herein.It is provided in an embodiment of the present invention Security postures intelligent analysis method, device and the storage medium of mobile terminal can be adapted for carrying out security postures to mobile terminal Analysis, but it is not limited only to this.
As shown in figure 5, the security postures intellectual analysis device 500 of mobile terminal can be mobile phone, computer, number Broadcast terminal, messaging devices, game console, tablet device, personal digital assistant etc..
Referring to Fig. 5, the security postures intellectual analysis device 500 of mobile terminal may include following one or more components: Processing component 502, memory 504, power supply module 506, multimedia component 508, audio component 510, input/output (I/O) Interface 512, sensor module 514 and communication component 516.
Processing component 502 usually control unmanned aerial vehicle (UAV) control device 500 integrated operation, such as with display, call, number According to communication, camera operation and record operate associated operation.Processing component 502 may include one or more processors 520 To execute instruction.
In addition, processing component 502 may include one or more modules, convenient between processing component 502 and other assemblies Interaction.For example, processing component 502 may include multi-media module, with facilitate multimedia component 508 and processing component 502 it Between interaction.
Memory 504 is configured as storing various types of data to support the operation in unmanned aerial vehicle (UAV) control device 500.This The example of a little data includes the instruction of any application or method for operating on unmanned aerial vehicle (UAV) control device 500, connection Personal data, telephone book data, message, picture, video etc..Memory 504 can be by any kind of volatibility or non-volatile It stores equipment or their combination is realized, such as static random access memory (SRAM), the read-only storage of electrically erasable Device (EEPROM), Erasable Programmable Read Only Memory EPROM (EPROM), programmable read only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, disk or CD.
Power supply module 506 provides electric power for the various assemblies of unmanned aerial vehicle (UAV) control device 500.Power supply module 506 may include Power-supply management system, one or more power supplys and other with for unmanned aerial vehicle (UAV) control device 500 generate, manage, and distribute electric power phase Associated component.
Multimedia component 508 includes one output interface of offer between the unmanned aerial vehicle (UAV) control device 500 and user Screen.In some embodiments, screen may include liquid crystal display (LCD) and touch panel (TP).If screen includes Touch panel, screen may be implemented as touch screen, to receive input signal from the user.Touch panel includes one or more A touch sensor is to sense the gesture on touch, slide, and touch panel.The touch sensor can not only sense touch Or the boundary of sliding action, but also detect duration and pressure associated with the touch or slide operation.In some realities It applies in example, multimedia component 508 includes a front camera and/or rear camera.When unmanned aerial vehicle (UAV) control device 500 is in Operation mode, such as in a shooting mode or a video mode, front camera and/or rear camera can receive external multimedia Data.Each front camera and rear camera can be a fixed optical lens system or there is focal length and optics to become Burnt ability.
Audio component 510 is configured as output and/or input audio signal.For example, audio component 510 includes a Mike Wind (MIC), when unmanned aerial vehicle (UAV) control device 500 is in operation mode, when such as call mode, recording mode, and voice recognition mode, Microphone is configured as receiving external audio signal.The received audio signal can be further stored in memory 504 or It is sent via communication component 516.In some embodiments, audio component 510 further includes a loudspeaker, for exporting audio letter Number.
I/O interface 512 provides interface between processing component 502 and peripheral interface module, and above-mentioned peripheral interface module can To be keyboard, click wheel, button etc..These buttons may include, but are not limited to: home button, volume button, start button and lock Determine button.
Sensor module 514 includes one or more sensors, for providing various aspects for unmanned aerial vehicle (UAV) control device 500 Status assessment.For example, sensor module 514 can detecte the state that opens/closes of unmanned aerial vehicle (UAV) control device 500, component Relative positioning, such as the component is the display and keypad of unmanned aerial vehicle (UAV) control device 500, and sensor module 514 may be used also To detect the position change of 500 1 components of unmanned aerial vehicle (UAV) control device 500 or unmanned aerial vehicle (UAV) control device, user and unmanned aerial vehicle (UAV) control The existence or non-existence that device 500 contacts, 500 orientation of unmanned aerial vehicle (UAV) control device or acceleration/deceleration and unmanned aerial vehicle (UAV) control device 500 Temperature change.Sensor module 514 may include proximity sensor, be configured to examine without any physical contact Survey presence of nearby objects.Sensor module 514 can also include that optical sensor is used for such as CMOS or ccd image sensor It is used in imaging applications.In some embodiments, which can also include acceleration transducer, and gyroscope passes Sensor, Magnetic Sensor, pressure sensor or temperature sensor.
Communication component 516 is configured to facilitate wired or wireless way between unmanned aerial vehicle (UAV) control device 500 and other equipment Communication.Unmanned aerial vehicle (UAV) control device 500 can access the wireless network based on communication standard, such as WiFi, 2G or 3G or they Combination.In one exemplary embodiment, communication component 516 is received via broadcast channel from the wide of external broadcasting management system Broadcast signal or broadcast related information.In one exemplary embodiment, the communication component 516 further includes near-field communication (NFC) Module, to promote short range communication.For example, radio frequency identification (RFID) technology, Infrared Data Association (IrDA) can be based in NFC module Technology, ultra wide band (UWB) technology, bluetooth (BT) technology and other technologies are realized.
In the exemplary embodiment, unmanned aerial vehicle (UAV) control device 500 can be by one or more application specific integrated circuit (ASIC), digital signal processor (DSP), digital signal processing appts (DSPD), programmable logic device (PLD), scene can Gate array (FPGA), controller, microcontroller, microprocessor or other electronic components are programmed to realize.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for equipment reality For applying example, since it is substantially similar to the method embodiment, so describing fairly simple, related place is referring to embodiment of the method Part explanation.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with Relevant hardware is instructed to complete by computer program, the program can be stored in a computer-readable storage medium In, the program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, the storage medium can be magnetic Dish, CD, read-only memory (Read-Only Memory, ROM) or random access memory (RandomAccess Memory, RAM) etc..
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any In the technical scope disclosed by the present invention, any changes or substitutions that can be easily thought of by those familiar with the art, all answers It is included within the scope of the present invention.Therefore, protection scope of the present invention should be subject to the protection scope in claims.

Claims (11)

1. a kind of security postures intelligent analysis method of mobile terminal characterized by comprising
The marked security postures data of mobile terminal are obtained, the marked security postures data include mobile terminal exception row For data, mobile terminal potential threat data or running of mobile terminal situation data;
Extract the corresponding security postures feature of the marked security postures data;
Based on the security postures feature, security postures analysis model is trained;
The security postures analysis model obtained by training carries out security postures analysis to mobile terminal.
2. the security postures intelligent analysis method of mobile terminal according to claim 1, which is characterized in that described to pass through instruction The security postures analysis model got carries out security postures analysis to mobile terminal, comprising:
The security postures analysis model obtained by training carries out security postures analysis to mobile terminal, obtains security postures point Grade is analysed, the security postures analytical grade includes: high-risk situation, middle danger situation, low danger situation or security postures.
3. the security postures intelligent analysis method of mobile terminal according to claim 1, which is characterized in that the method is also Include:
Based on the security postures analysis to mobile terminal as a result, push security threat data and/or warning information data.
4. the security postures intelligent analysis method of mobile terminal according to claim 3, which is characterized in that the method is also Include:
To the analysis of the security postures of the mobile terminal as a result, and the security threat data and/or warning information data into Row visualizes;
Wherein, the content of the visual presentation further includes following any one or any combination: the shifting captured in predetermined period Dynamic terminal security total number of events, security incident quantity category statistics, security incident quantity are by threat degree statistics, safe early warning Notification sum, safe early warning notification category statistics, mobile terminal liveness ranking, mobile terminal are united by the service condition in region Meter, app installation situation ranking, terminal security situation statistics, high-risk terminal ranking.
5. the security postures intelligent analysis method of mobile terminal according to claim 1, which is characterized in that described to pass through instruction The security postures analysis model got carries out security postures analysis to mobile terminal, comprising:
The mobile terminal data is obtained, the mobile terminal data includes the user information of mobile terminal, mobile software and hardware money Source, system log, using log, alarm log and error log;
The mobile terminal data is inputted into the security postures analysis model that the training obtains, is obtained to the mobile terminal Security postures analyze result.
6. a kind of security postures intellectual analysis device of mobile terminal characterized by comprising
Module is obtained, for obtaining the marked security postures data of mobile terminal, the marked security postures data include Mobile terminal abnormal behaviour data, mobile terminal potential threat data or running of mobile terminal situation data;
Extraction module, for extracting the corresponding security postures feature of the marked security postures data;
Training module is trained security postures analysis model for being based on the security postures feature;
Analysis module, the security postures analysis model for being obtained by training carry out security postures analysis to mobile terminal.
7. the security postures intellectual analysis device of mobile terminal according to claim 6, which is characterized in that
The analysis module is also used to the security postures analysis model obtained by training, carries out security postures to mobile terminal Analysis, obtains security postures analytical grade, the security postures analytical grade includes: high-risk situation, middle danger situation, low danger state Gesture or security postures.
8. the security postures intellectual analysis device of mobile terminal according to claim 6, which is characterized in that described device is also Include:
Pushing module, for being analyzed based on the security postures to mobile terminal as a result, push security threat data and/or early warning letter Cease data.
9. the security postures intellectual analysis device of mobile terminal according to claim 8, which is characterized in that described device is also Include:
Display module, for the security postures analysis to the mobile terminal as a result, and security threat data and/or pre- Alert information data is visualized;Wherein, the content of the visual presentation further includes following any one or any group Close: mobile terminal safety total number of events, security incident quantity category statistics, the security incident quantity captured in predetermined period is pressed Threat degree statistics, safe early warning notification sum, safe early warning notification category statistics, mobile terminal liveness ranking, movement Service condition statistics, app installation situation ranking, terminal security situation statistics, high-risk terminal ranking of the terminal by region.
10. the security postures intellectual analysis device of mobile terminal according to claim 6, which is characterized in that
The analysis module, is also used to obtain the mobile terminal data, and the mobile terminal data includes the use of mobile terminal Family information moves software and hardware resources, system log, using log, alarm log and error log;And by the mobile terminal Data input the security postures analysis model that the training obtains, and obtain analyzing result to the security postures of the mobile terminal.
11. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that described program is processed The step of claim 1-5 the method is realized when device executes.
CN201811356911.2A 2018-11-15 2018-11-15 Security postures intelligent analysis method, device and the storage medium of mobile terminal Pending CN109598120A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811356911.2A CN109598120A (en) 2018-11-15 2018-11-15 Security postures intelligent analysis method, device and the storage medium of mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811356911.2A CN109598120A (en) 2018-11-15 2018-11-15 Security postures intelligent analysis method, device and the storage medium of mobile terminal

Publications (1)

Publication Number Publication Date
CN109598120A true CN109598120A (en) 2019-04-09

Family

ID=65958352

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811356911.2A Pending CN109598120A (en) 2018-11-15 2018-11-15 Security postures intelligent analysis method, device and the storage medium of mobile terminal

Country Status (1)

Country Link
CN (1) CN109598120A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110225543A (en) * 2019-05-30 2019-09-10 上海交通大学 Mobile terminal software quality Situation Awareness System and method based on network request packet
CN111917785A (en) * 2020-08-06 2020-11-10 重庆邮电大学 Industrial internet security situation prediction method based on DE-GWO-SVR
CN113449537A (en) * 2020-03-10 2021-09-28 奇安信科技集团股份有限公司 Wireless network security situation perception visualization method and device and electronic equipment
CN114139210A (en) * 2021-12-15 2022-03-04 智谷互联网科技(廊坊)有限公司 Big data security threat processing method and system based on intelligent service

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103795723A (en) * 2014-01-28 2014-05-14 河南科技大学 Distributed type internet-of-things safety situation awareness method
CN105681303A (en) * 2016-01-15 2016-06-15 中国科学院计算机网络信息中心 Big data driven network security situation monitoring and visualization method
CN108632081A (en) * 2018-03-26 2018-10-09 中国科学院计算机网络信息中心 Network Situation appraisal procedure, device and storage medium

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103795723A (en) * 2014-01-28 2014-05-14 河南科技大学 Distributed type internet-of-things safety situation awareness method
CN105681303A (en) * 2016-01-15 2016-06-15 中国科学院计算机网络信息中心 Big data driven network security situation monitoring and visualization method
CN108632081A (en) * 2018-03-26 2018-10-09 中国科学院计算机网络信息中心 Network Situation appraisal procedure, device and storage medium

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
HANJI SHEN ET AL: ""Security Situation Assessment Method Based on States Transition*"", 《INTERNATIONAL CONFERENCE ON INFORMATION AND AUTOMATION》 *
张琦: ""基于Android的移动互联网终端安全态势感知技术研究"", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *
邓晓东 等: ""大数据网络安全态势感知中数据融合技术研究"", 《数据安全与云计算》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110225543A (en) * 2019-05-30 2019-09-10 上海交通大学 Mobile terminal software quality Situation Awareness System and method based on network request packet
CN110225543B (en) * 2019-05-30 2021-11-30 上海交通大学 Mobile terminal software quality situation perception system and method based on network request data
CN113449537A (en) * 2020-03-10 2021-09-28 奇安信科技集团股份有限公司 Wireless network security situation perception visualization method and device and electronic equipment
CN111917785A (en) * 2020-08-06 2020-11-10 重庆邮电大学 Industrial internet security situation prediction method based on DE-GWO-SVR
CN111917785B (en) * 2020-08-06 2022-07-15 重庆邮电大学 Industrial internet security situation prediction method based on DE-GWO-SVR
CN114139210A (en) * 2021-12-15 2022-03-04 智谷互联网科技(廊坊)有限公司 Big data security threat processing method and system based on intelligent service

Similar Documents

Publication Publication Date Title
KR101852284B1 (en) Alarming method and device
CN109598120A (en) Security postures intelligent analysis method, device and the storage medium of mobile terminal
KR101932844B1 (en) Device and method of making video calls and method of mediating video calls
US20210334325A1 (en) Method for displaying information, electronic device and system
CN105930247B (en) Processing method, device and the mobile terminal of system reboot problem
US20220067379A1 (en) Category labelling method and device, and storage medium
CN109842612B (en) Log security analysis method and device based on graph library model and storage medium
CN106231419A (en) Operation performs method and device
CN111240482B (en) Special effect display method and device
WO2021093427A1 (en) Visitor information management method and apparatus, electronic device, and storage medium
CN105701997A (en) Alarm method and device
CN110476141A (en) Sight tracing and user terminal for executing this method
CN109951476A (en) Attack Prediction method, apparatus and storage medium based on timing
CN109766473B (en) Information interaction method and device, electronic equipment and storage medium
CN106325670A (en) Message prompting method and device
CN108174026A (en) The safety prompt function method, apparatus and electronic equipment of a kind of mobile terminal
CN110222706A (en) Ensemble classifier method, apparatus and storage medium based on feature reduction
CN109614181A (en) Security postures methods of exhibiting, device and the storage medium of mobile terminal
CN106331328B (en) Information prompting method and device
CN115909127A (en) Training method of abnormal video recognition model, abnormal video recognition method and device
CN109981624A (en) Intrusion detection method, device and storage medium
KR20200078155A (en) recommendation method and system based on user reviews
CN113032627A (en) Video classification method and device, storage medium and terminal equipment
CN109542297A (en) The method, apparatus and electronic equipment of operation guiding information are provided
CN109614794A (en) Feature selection approach, device and storage medium based on information gain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination