CN106503552A - The Android malware detecting system that is excavated with pattern of traffic based on signature and method - Google Patents

The Android malware detecting system that is excavated with pattern of traffic based on signature and method Download PDF

Info

Publication number
CN106503552A
CN106503552A CN201610832280.1A CN201610832280A CN106503552A CN 106503552 A CN106503552 A CN 106503552A CN 201610832280 A CN201610832280 A CN 201610832280A CN 106503552 A CN106503552 A CN 106503552A
Authority
CN
China
Prior art keywords
pattern
traffic
signature
data
android application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610832280.1A
Other languages
Chinese (zh)
Inventor
宁卓
邵达成
郑之奇
胡婷
张佩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Post and Telecommunication University
Nanjing University of Posts and Telecommunications
Original Assignee
Nanjing Post and Telecommunication University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Post and Telecommunication University filed Critical Nanjing Post and Telecommunication University
Priority to CN201610832280.1A priority Critical patent/CN106503552A/en
Publication of CN106503552A publication Critical patent/CN106503552A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/564Static detection by virus signature recognition
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/033Test or assess software

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Virology (AREA)
  • General Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

Disclosed herein is a kind of based on the Android malware detecting system and method signed with pattern of traffic excavation, the system includes signature analysis component and data-flow analysis component;Wherein, signature analysis component includes signature generation module, malware signature database and signatures match module;Data-flow analysis component excavates module, pattern of traffic matching module and pattern of traffic rule base comprising data-flow analysis module, pattern of traffic.During work, sign computing and pattern of traffic excavation are carried out to known malware first, malware signature storehouse and pattern of traffic rule base is set up, then, software under testing is allowed to carry out signatures match and data flow rule match, so as to judge whether software under testing is malice privacy leakage software.Instant invention overcomes the detection of traditional data stream needs the inferior position that carries out manual confirmation, improve detection efficiency, it is to avoid the wrong report problem that " abusing one's power " problem is brought.

Description

Based on signature with pattern of traffic excavate Android malware detecting system and Method
Technical field
The present invention relates to pattern of traffic excavation applications, more particularly to a kind of excavated based on signature and pattern of traffic Android malware detecting system and method.
Background technology
Android is operation system of smart phone most widely used at present, in 2014, the sales volume of Android phone The 81% of global mobile phone sales quota has just been accounted for, 1,000,000,000 have been reached.On the other hand, the opening of android system is being subject to Application developer also brings the safety problem of many while favor.Currently, Android platform has that to steal user in a large number hidden Private Malware, seriously threaten user use safety.
The Android malware detection method of main flow has two kinds, dynamic analysing method and Static Analysis Method.Dynamic Analysis method builds the running environment of Android, can simulate the real behavior feature of software under testing, this detection method essence Degree is high, but due to needing software dynamic operation, it is therefore desirable to expend resource.Static Analysis Method feature is without the need for software under testing Whether operation, it belong to Malware, the weak point of this method by signature or controlling stream, data flow come analysis software It is easily to produce wrong report.
The Static Analysis Technology of existing Android software can be divided three classes:Based on the detection scheme of authority, based on biography The detection scheme and the detection scheme based on machine learning of system static analysis means.
Based on the detection scheme of authority, these schemes are by extracting Manifest file applications in Android application softwaries Authority information be analyzed, judge by the rules of competence set up in advance whether application is malicious application.Kirin instruments lead to The authority combination of predefined one group regular hazard recognition is crossed, but it provides only the high-risk power that 9 malicious application races frequently use , then as examination criteria, power of test is limited for limit gauge.Other main flow document employs the method for data mining and excavates malice Relation in application between applied authority, in this, as rule, detects application to be measured.But in actual development, developer Often apply for excessive authority, with the difficulty for mitigating exploitation and safeguard, " abusing one's power " problem of this generally existing is easily caused Detection scheme based on authority produces wrong report, although that is, the authority using certain system resource has been applied in application, does not exist In code execute, and based on authority detection if it find that application application authority consistent with safety regulation, then just may cause Often software is reported by mistake.To sum up, the detection scheme based on authority cannot solve the problems, such as the wrong report that " abusing one's power " phenomenon is brought.
Detection scheme based on traditional static analysis means mainly has signature detection and data stream analysis techniques.Classical Signature detection can carry out MD5 computings or SHA computings to whole rogue program or portion of program code, by computing after eigenvalue Signature as this document.If it find that software under testing signature is matched with the malware signature that collects in advance it is determined that disliking Meaning software.The scanning speed of this method is fast, and precision is high, have the disadvantage can only the specific Malware of killing, the method The Malware obscured by mutation is invalid.A kind of multistage signature system is proposed for this problem, Zhiyuan Wang et al., It is used for collecting, detecting that Android malware, system are numbered the API of Android first, then, scans apk to be measured System API in file, represents these API with numbering, afterwards, generates MD5 and signs, then production method is signed step by step, class is signed, Apk signs, and can effectively detect that some beat again the Malware of bag, Code obfuscation using the method.But this method It is not the analysis of data flow aspect, it is impossible to enough resist using the Code obfuscation based on API.Zhemin Yang、Zhibo Zhao, C. Fritz, W Klieber et al. each proposes the analytical tool based on data flow, although data-flow analysis can Whole application software code is covered, the accuracy of analysis is higher, but on the one hand this full code analysis are than relatively time-consuming, another Aspect, the result of data-flow analysis can not provide whether software is Malware, often also need to artificial judgment, confirm data Whether stream is malicious data flow.To sum up, the signature technology of main flow is a kind of technology for uniquely representing software features, it is impossible to right Software under testing carries out depth analysis, and therefore testing result is inevitably disturbed by malware technologies such as Code obfuscations, The defect of data stream analysis techniques is the time-consuming problem and need manually to carry out final result determination that full code analysis cause. For known Malware, also there is duplicate detection in data-flow analysis.
Based on the detection scheme of machine learning, by learning to the static nature of Malware, such as learn authority Feature, API features etc., make machine learning algorithm draw disaggregated model, then carry out malware detection.The shortcoming of this scheme It is for the requirement of characteristic of division is higher, effective precision for directly determining classification of feature.Most of machine learning sides Used as characteristic information, therefore, they can not solve the wrong report that " abusing one's power " phenomenon is brought to method still access right.
Content of the invention
The technical problem to be solved is for involved defect in background technology, there is provided a kind of based on label Android malware detecting system and method that name is excavated with pattern of traffic.
The present invention is employed the following technical solutions for solving above-mentioned technical problem:
Based on the Android malware detecting system that signature is excavated with pattern of traffic, comprising signature analysis component and number According to stream analytic unit;
The signature analysis component includes signature generation module, malware signature database and signatures match module;
The signature generation module is used for the signature for generating Android application softwaries;
The malware signature database is used for the signature for storing all default malice Android application softwaries;
The signatures match module is used for deposit in the signature and malware signature database of the Android application softwaries of input The signature of storage is mated;
The data-flow analysis component excavates module, pattern of traffic coupling mould comprising data-flow analysis module, pattern of traffic Block and pattern of traffic rule base;
The data-flow analysis module is used for analyzing the Android application softwaries of input and whether there is pattern of traffic, if deposited Extracting the pattern of traffic in the Android application softwaries of input;
The pattern of traffic excavates module to be used for confidence level in all default malice Android application softwaries more than default Confidence threshold value and support screen more than the pattern of traffic of support threshold set in advance;
The pattern of traffic rule base is used for storage and excavates the pattern of traffic that module is screened through pattern of traffic;
The pattern of traffic matching module is used for the pattern of traffic and pattern of traffic of the Android application softwaries of input Pattern of traffic in rule base is mated.
The invention also discloses a kind of Android malware detecting system that is excavated with pattern of traffic based on signature Detection method, comprises the steps of:
Step 1), all default malice Android application softwaries are carried out with signature training and are trained with pattern of traffic, generated and dislike Meaning software signature data base and pattern of traffic rule base;
Step 2), Android application softwaries to be measured are input into the signature generation module in signature analysis component, are generated to be measured The signature of Android application softwaries, and it is input to signatures match module;
Step 3), signatures match module is by the label in the signature of Android application softwaries to be measured and malware signature database Name is mated, if there is the signature consistent with the signature of Android application softwaries to be measured in hostile signature data base, judges The signature of the Android application softwaries to be measured be Malware, detection of end;Otherwise, execution step 4);
Step 4), Android application softwaries to be measured are delivered to the data-flow analysis module in data-flow analysis component, data flow point Analysis module analysis Android application softwaries to be measured, are extracted to be measured if there is pattern of traffic with the presence or absence of pattern of traffic The pattern of traffic of Android application softwaries, execution step 5);It is judged to fail-safe software if it there is no pattern of traffic, ties Beam is detected;
Step 5), the pattern of traffic of Android application softwaries to be measured is input into data stream matches module, data stream matches mould The pattern of traffic of Android application softwaries to be measured is mated by block with the pattern of traffic in pattern of traffic rule base, If there is the pattern of traffic consistent with the pattern of traffic of Android application softwaries to be measured in pattern of traffic rule base, Android application softwaries to be measured are judged as malicious application, detection of end;Otherwise, it is determined that Android application softwaries to be measured are risk Application, detection of end.
The step 1)Comprise the following steps that:
Step 1.1), successively all default malice Android application softwaries are input into signature analysis component;
Step 1.2), the malice Android application software life that signature analysis component is input into each using signature generation module Into MD5 sign, and sign and software name be stored in malware signature database;
Step 1.3), successively all default malice Android application softwaries are input into data-flow analysis component;
Step 1.4), data-flow analysis component is applied soft using data-flow analysis module to each malice Android of input Part carries out data-flow analysis, draws the pattern of traffic of each malice Android application software, and which is transported to data flow successively Mode excavation module;
Step 1.5), pattern of traffic excavates module by confidence level in the pattern of traffic of each malice Android application software It is more than default confidence threshold value and support is screened more than the pattern of traffic of support threshold set in advance, and will Which is stored in pattern of traffic rule base.
The present invention adopts above technical scheme compared with prior art, with following technique effect:
(1) by the present invention in that with signature technology and pattern of traffic digging technology, not using the authority information of application software, keeping away The wrong report problem of " abusing one's power " phenomenon generation is exempted from;
(2) present invention compensate for signature technology presence by combining signature technology and pattern of traffic digging technology, it is difficult to The shortcoming of accurate analysis is carried out to Code obfuscation class Malware, meanwhile, the use of signature analysis component also improves main flow number According to the duplicate detection problem that stream analytical plan is present, detection speed is improve;
(3) by the present invention in that being excavated with pattern of traffic, improving common data stream analytical plan needs lacking for manual confirmation Point, high degree of automation.
Description of the drawings
Fig. 1 is the Android malware detecting system Organization Chart excavated with pattern of traffic based on signature;
Fig. 2 is present system testing process.
Specific embodiment
Below in conjunction with the accompanying drawings technical scheme is described in further detail:
Disclosed herein is a kind of Android malware detecting system that is excavated with pattern of traffic based on signature, is a kind of quiet State analyzes detecting system, and it is without the need for software under testing dynamic operation.The system includes 2 components:Signature analysis component and data flow Analytic unit.The speed that known malware is investigated by signature analysis group piece optimization system, by data-flow analysis component Analysis can obtain the frequent mode of malware data stream, in this, as the detection of the unknown software of rules guide.Separately below to 2 Individual component is introduced.
1) signature analysis component
Signature analysis component includes signature generation module, malware signature database and signatures match module;Wherein, signature life It is used for the signature for generating Android application softwaries into module;Malware signature database is used for storing all default malice The signature of Android application softwaries;Signatures match module is used for the signature and Malware of the Android application softwaries of input The signature stored in signature database is mated.
The core of signature analysis component is signature generation module, for generating the signature value of Android application softwaries, signature Algorithm is integrally signed to apk using MD5 signature algorithms.Signature generation module is ensure that per a by computing of signing The application software of signature can obtain different signature values.Therefore, if unknown software signature and a certain malware signature one Cause, then illustrate that unknown software is exactly this Malware.
The function of signature analysis component is:Signature value is generated to a certain amount of Malware, is stored in be formed in data base and is disliked Meaning software signature data base, in detection, signs to unknown Software Create, and which is carried out in malware signature storehouse Match somebody with somebody, if there is coupling, i.e., unknown software signature is consistent with certain malware signature, then unknown software is assert for Malware, If conversely, arbitrarily signature is all inconsistent in unknown software signature and storehouse, unknown software is transferred in data-flow analysis component Data-flow analysis module is analyzed.
2) data-flow analysis component
Data-flow analysis component comprising data-flow analysis module, pattern of traffic excavate module, pattern of traffic matching module and Pattern of traffic rule base;Wherein, data-flow analysis module is used for analyzing the Android application softwaries of input with the presence or absence of data Stream mode, if it does, the pattern of traffic in extracting the Android application softwaries of input;Pattern of traffic excavates module For by confidence level in all default malice Android application softwaries is more than default confidence threshold value and support is more than pre- The pattern of traffic of the support threshold for first setting is screened;Pattern of traffic rule base is used for storage and digs through pattern of traffic The pattern of traffic that pick module is screened;Pattern of traffic matching module is used for the number of the Android application softwaries of input Mated with the pattern of traffic in pattern of traffic rule base according to stream mode.
Data-flow analysis component is the core component of system, and the assembly function is:Complete the data flow point to Malware These frequent data item stream mode are stored in data base as rule by analysis, the frequent data item stream mode for excavating Malware, constitute number According to stream mode rule base.Afterwards, the component will also carry out data-flow analysis to the unknown software of signatures match failure, by its data Stream mode (if not existing, assert which is fail-safe software) is mated in data flow rule base, if finding identical data Stream mode then regards as Malware, conversely, regarding as non-risk software, there is privacy leakage risk.Data-flow analysis component bag Module containing data-flow analysis, pattern of traffic excavate module and pattern of traffic rule base.
Data-flow analysis module completes the decompiling of Android application softwaries, data flow diagram and builds and stain analysis work( Energy.The form of Android application software installation kits is apk files, and it is actually a compressed file, data-flow analysis module Data-flow analysis to be carried out first has to for apk files to carry out decompiling, parses various configuration files therein and code file, Source code is recovered or is indicated with the form of intermediate code (IR).Afterwards, in labelling program code various sensitive datas (ratio Such as contact person, SMS information, mail etc.), construction procedures data flow diagram, then according to this figure, carries out stain analysis, follows the trail of Labeled sensitive data.If analyzed software has the data flow for revealing privacy, the module can draw shape such as { source, sink }, such binary set.Each binary set is a potential privacy leakage path.source It is the api function in system with sink, wherein source is the entrance function that stain data enter analysis process, usually Android system is used for reading the api function such as short message reading of sensitive data, reads mail etc..Sink be stain data from The export function of analysis process is opened, and note is sent usually in android system, opens the api function that URL etc. sends data. The privacy leakage of Android application softwaries is inside program, because existing, { source, sink } is such to be read, send Path is possibly realized just can sensitive data leakage.
By data-flow analysis being carried out to a certain amount of Malware, can obtain the road that every money Malware reveals privacy Footpath, i.e., pattern of traffic as many { source, sink }.Pattern of traffic excavates module and is directed to substantial amounts of malice { source, sink } pattern of traffic is associated excavation, it is therefore an objective to find out the road of the leakage privacy that Malware is frequently used , that is, there is frequently certain several { source, sink } set, by these frequent data item stream mode as judging malice privacy in footpath Reveal the rule of software.
In order to be associated excavate firstly the need of define 2 threshold values, one be confidence threshold value p (Confidence) and prop up Degree of holding threshold value p (Support), the two threshold values are used for garbled data stream mode, if the confidence level p of a data stream mode (Confidence) and support p (Support) is above given threshold value, then just by this data stream mode as rule, It is added in pattern of traffic rule base.
The computing formula of p (Confidence) and p (Support) is as follows, and wherein p (source, sink) is the data The probability that stream mode { source, sink } occurs in all pattern of traffics.P (sink | source) it is with source letters During number is as all pattern of traffics of entrance function, there is probability of the sink functions as export function.count(source, Sink) it is number of times that { source, the sink } pattern of traffic occurs in all set of modes, p (source) is with this The pattern of traffic probability that in all pattern of traffic set occur of the source functions as entrance function.T is represented and is passed through Analyze entirety { source, the sink } pattern of traffic obtained by a certain amount of Malware.
(1) p(Support)= p(source, sink) = count(source, sink)/T
(2) p(Confidence)= p(sink | source) = p(source, sink)/p(source)
After confidence level that Malware every kind of { source, sink } occurs and support has been calculated, every two values are all big In the pattern of traffic of previously given threshold value, will be added in pattern of traffic rule base.Complete pattern of traffic rule After storehouse is set up, in the case that unknown software fails coupling in signature component, with its data flow of data-flow analysis module analysis Pattern, is then mated with the rule in data flow rule base, if there is consistent { source, sink } pattern, is then illustrated Software under testing occurs in that the privacy leakage path frequently occurred in Malware, it is possible to assert that the unknown software is malice privacy Software is revealed, conversely, illustrating that the software has leakage privacy risk, but is not Malware.Certainly, if unknown software is passed through After data-flow analysis module analysis, there is no leakage path, then just directly assert that the software is fail-safe software.
The system architecture diagram of the present invention and using step as shown in figure 1, system chooses a certain amount of Malware first, Signature computing is carried out by device of signing and draws malware signature database, then allow Malware to enter by data-flow analysis module Row data-flow analysis, draws the pattern of traffic of these Malwares, then excavates module using pattern of traffic and is excavated, The pattern of traffic that Malware is frequently used is excavated, they are stored in pattern of traffic rule base.Obtaining above-mentioned two Have detected for unknown software is can be carried out behind rule-like storehouse.
Detection idiographic flow such as Fig. 2 of the present invention, comprises the steps of:
Step 1), all default malice Android application softwaries are carried out with signature training and are trained with pattern of traffic, generated and dislike Meaning software signature data base and pattern of traffic rule base;
Step 2), Android application softwaries to be measured are input into the signature generation module in signature analysis component, are generated to be measured The signature of Android application softwaries, and it is input to signatures match module;
Step 3), signatures match module is by the label in the signature of Android application softwaries to be measured and malware signature database Name is mated, if there is the signature consistent with the signature of Android application softwaries to be measured in hostile signature data base, judges The signature of the Android application softwaries to be measured be Malware, detection of end;Otherwise, execution step 4);
Step 4), Android application softwaries to be measured are delivered to the data-flow analysis module in data-flow analysis component, data flow point Analysis module analysis Android application softwaries to be measured, are extracted to be measured if there is pattern of traffic with the presence or absence of pattern of traffic The pattern of traffic of Android application softwaries, execution step 5);It is judged to fail-safe software if it there is no pattern of traffic, ties Beam is detected;
Step 5), the pattern of traffic of Android application softwaries to be measured is input into data stream matches module, data stream matches mould The pattern of traffic of Android application softwaries to be measured is mated by block with the pattern of traffic in pattern of traffic rule base, If there is the pattern of traffic consistent with the pattern of traffic of Android application softwaries to be measured in pattern of traffic rule base, Android application softwaries to be measured are judged as malicious application, detection of end;Otherwise, it is determined that Android application softwaries to be measured are risk Application, detection of end.
The step 1)Comprise the following steps that:
Step 1.1), successively all default malice Android application softwaries are input into signature analysis component;
Step 1.2), the malice Android application software life that signature analysis component is input into each using signature generation module Into MD5 sign, and sign and software name be stored in malware signature database;
Step 1.3), successively all default malice Android application softwaries are input into data-flow analysis component;
Step 1.4), data-flow analysis component is applied soft using data-flow analysis module to each malice Android of input Part carries out data-flow analysis, draws the pattern of traffic of each malice Android application software, and which is transported to data flow successively Mode excavation module;
Step 1.5), pattern of traffic excavates module by confidence level in the pattern of traffic of each malice Android application software It is more than default confidence threshold value and support is screened more than the pattern of traffic of support threshold set in advance, and will Which is stored in pattern of traffic rule base..
The system of this paper overcomes the inferior position that the detection of traditional data stream needs to carry out manual confirmation, improves detection efficiency, Compared to malware detection method of the tradition based on authority, the system avoids the wrong report problem that " abusing one's power " problem is brought.With When, the system passes through signature technology so that detection repeats the speed of Malware and obtains significant increase.
Those skilled in the art of the present technique it is understood that unless otherwise defined, all terms used herein(Including skill Art term and scientific terminology)There is the general understanding identical meaning with the those of ordinary skill in art of the present invention.Also It should be understood that those terms defined in such as general dictionary should be understood that have with the context of prior art in The consistent meaning of meaning, and unless defined as here, will not be explained with idealization or excessively formal implication.
Above-described specific embodiment, has been carried out further to the purpose of the present invention, technical scheme and beneficial effect Describe in detail, the be should be understood that specific embodiment that the foregoing is only the present invention is not limited to this Bright, all any modification, equivalent substitution and improvements that within the spirit and principles in the present invention, is done etc. should be included in the present invention Protection domain within.

Claims (3)

1. the Android malware detecting system that is excavated with pattern of traffic based on signature, it is characterised in that comprising signature point Analysis component and data-flow analysis component;
The signature analysis component includes signature generation module, malware signature database and signatures match module;
The signature generation module is used for the signature for generating Android application softwaries;
The malware signature database is used for the signature for storing all default malice Android application softwaries;
The signatures match module is used for deposit in the signature and malware signature database of the Android application softwaries of input The signature of storage is mated;
The data-flow analysis component excavates module, pattern of traffic coupling mould comprising data-flow analysis module, pattern of traffic Block and pattern of traffic rule base;
The data-flow analysis module is used for analyzing the Android application softwaries of input and whether there is pattern of traffic, if deposited Extracting the pattern of traffic in the Android application softwaries of input;
The pattern of traffic excavates module to be used for confidence level in all default malice Android application softwaries more than default Confidence threshold value and support screen more than the pattern of traffic of support threshold set in advance;
The pattern of traffic rule base is used for storage and excavates the pattern of traffic that module is screened through pattern of traffic;
The pattern of traffic matching module is used for the pattern of traffic and pattern of traffic of the Android application softwaries of input Pattern of traffic in rule base is mated.
2. the detection method of the Android malware detecting system that is excavated with pattern of traffic based on signature, it is characterised in that Comprise the steps of:
Step 1), all default malice Android application softwaries are carried out with signature training and are trained with pattern of traffic, generated and dislike Meaning software signature data base and pattern of traffic rule base;
Step 2), Android application softwaries to be measured are input into the signature generation module in signature analysis component, are generated to be measured The signature of Android application softwaries, and it is input to signatures match module;
Step 3), signatures match module is by the label in the signature of Android application softwaries to be measured and malware signature database Name is mated, if there is the signature consistent with the signature of Android application softwaries to be measured in hostile signature data base, judges The signature of the Android application softwaries to be measured be Malware, detection of end;Otherwise, execution step 4);
Step 4), Android application softwaries to be measured are delivered to the data-flow analysis module in data-flow analysis component, data flow point Analysis module analysis Android application softwaries to be measured, are extracted to be measured if there is pattern of traffic with the presence or absence of pattern of traffic The pattern of traffic of Android application softwaries, execution step 5);It is judged to fail-safe software if it there is no pattern of traffic, ties Beam is detected;
Step 5), the pattern of traffic of Android application softwaries to be measured is input into data stream matches module, data stream matches mould The pattern of traffic of Android application softwaries to be measured is mated by block with the pattern of traffic in pattern of traffic rule base, If there is the pattern of traffic consistent with the pattern of traffic of Android application softwaries to be measured in pattern of traffic rule base, Android application softwaries to be measured are judged as malicious application, detection of end;Otherwise, it is determined that Android application softwaries to be measured are risk Application, detection of end.
3. the Android malware detecting system that is excavated with pattern of traffic based on signature according to claim 2 Detection method, it is characterised in that the step 1)Comprise the following steps that:
Step 1.1), successively all default malice Android application softwaries are input into signature analysis component;
Step 1.2), the malice Android application software life that signature analysis component is input into each using signature generation module Into MD5 sign, and sign and software name be stored in malware signature database;
Step 1.3), successively all default malice Android application softwaries are input into data-flow analysis component;
Step 1.4), data-flow analysis component is applied soft using data-flow analysis module to each malice Android of input Part carries out data-flow analysis, draws the pattern of traffic of each malice Android application software, and which is transported to data flow successively Mode excavation module;
Step 1.5), pattern of traffic excavates module by confidence level in the pattern of traffic of each malice Android application software It is more than default confidence threshold value and support is screened more than the pattern of traffic of support threshold set in advance, and will Which is stored in pattern of traffic rule base.
CN201610832280.1A 2016-09-19 2016-09-19 The Android malware detecting system that is excavated with pattern of traffic based on signature and method Pending CN106503552A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610832280.1A CN106503552A (en) 2016-09-19 2016-09-19 The Android malware detecting system that is excavated with pattern of traffic based on signature and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610832280.1A CN106503552A (en) 2016-09-19 2016-09-19 The Android malware detecting system that is excavated with pattern of traffic based on signature and method

Publications (1)

Publication Number Publication Date
CN106503552A true CN106503552A (en) 2017-03-15

Family

ID=58291440

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610832280.1A Pending CN106503552A (en) 2016-09-19 2016-09-19 The Android malware detecting system that is excavated with pattern of traffic based on signature and method

Country Status (1)

Country Link
CN (1) CN106503552A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106971106A (en) * 2017-03-30 2017-07-21 维沃移动通信有限公司 A kind of method, mobile terminal and server for recognizing unauthorized applications
CN108171053A (en) * 2017-12-28 2018-06-15 北京奇虎科技有限公司 The method and system of a kind of rule discovery
CN108959092A (en) * 2018-07-09 2018-12-07 中国联合网络通信集团有限公司 Software action analysis method and system
CN113672919A (en) * 2021-08-05 2021-11-19 支付宝(杭州)信息技术有限公司 Risk detection method, device and equipment based on small program dynamic and static analysis
EP3918500B1 (en) * 2019-03-05 2024-04-24 Siemens Industry Software Inc. Machine learning-based anomaly detections for embedded software applications

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102034042A (en) * 2010-12-13 2011-04-27 四川大学 Novel unwanted code detecting method based on characteristics of function call relationship graph
CN102034050A (en) * 2011-01-25 2011-04-27 四川大学 Dynamic malicious software detection method based on virtual machine and sensitive Native application programming interface (API) calling perception
CN103842965A (en) * 2011-05-24 2014-06-04 帕洛阿尔托网络公司 Malware analysis system
CN104008340A (en) * 2014-06-09 2014-08-27 北京奇虎科技有限公司 Virus scanning and killing method and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102034042A (en) * 2010-12-13 2011-04-27 四川大学 Novel unwanted code detecting method based on characteristics of function call relationship graph
CN102034050A (en) * 2011-01-25 2011-04-27 四川大学 Dynamic malicious software detection method based on virtual machine and sensitive Native application programming interface (API) calling perception
CN103842965A (en) * 2011-05-24 2014-06-04 帕洛阿尔托网络公司 Malware analysis system
CN104008340A (en) * 2014-06-09 2014-08-27 北京奇虎科技有限公司 Virus scanning and killing method and device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
张怡婷: "基于朴素贝叶斯的Android软件恶意行为智能识别", 《东南大学学报》 *

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106971106A (en) * 2017-03-30 2017-07-21 维沃移动通信有限公司 A kind of method, mobile terminal and server for recognizing unauthorized applications
CN108171053A (en) * 2017-12-28 2018-06-15 北京奇虎科技有限公司 The method and system of a kind of rule discovery
CN108171053B (en) * 2017-12-28 2020-06-12 北京奇虎科技有限公司 Rule discovery method and system
CN108959092A (en) * 2018-07-09 2018-12-07 中国联合网络通信集团有限公司 Software action analysis method and system
CN108959092B (en) * 2018-07-09 2022-03-18 中国联合网络通信集团有限公司 Software behavior analysis method and system
EP3918500B1 (en) * 2019-03-05 2024-04-24 Siemens Industry Software Inc. Machine learning-based anomaly detections for embedded software applications
CN113672919A (en) * 2021-08-05 2021-11-19 支付宝(杭州)信息技术有限公司 Risk detection method, device and equipment based on small program dynamic and static analysis

Similar Documents

Publication Publication Date Title
CN106503552A (en) The Android malware detecting system that is excavated with pattern of traffic based on signature and method
CN112134761B (en) Electric power Internet of things terminal vulnerability detection method and system based on firmware analysis
CN105740712B (en) Android malicious act detection methods based on Bayesian network
CN113821804B (en) Cross-architecture automatic detection method and system for third-party components and security risks thereof
CN102567661B (en) Program recognition method and device based on machine learning
Alam et al. A framework for metamorphic malware analysis and real-time detection
TWI553503B (en) Method of generating in-kernel hook point candidates to detect rootkits and system thereof
CN106778268A (en) Malicious code detecting method and system
CN107392025A (en) Malice Android application program detection method based on deep learning
CN111523117A (en) Android malicious software detection and malicious code positioning system and method
CN105653956A (en) Android malicious software sorting method based on dynamic behavior dependency graph
CN103853979A (en) Program identification method and device based on machine learning
CN107948168A (en) Page detection method and device
CN104766015B (en) A kind of buffer-overflow vulnerability dynamic testing method based on function call
CN105868630A (en) Malicious PDF document detection method
CN110096433B (en) Method for acquiring encrypted data on iOS platform
CN108280348A (en) Android Malware recognition methods based on RGB image mapping
CN106874762B (en) Android malicious code detecting method based on API dependence graph
CN105740711B (en) A kind of malicious code detecting method and system based on kernel objects behavior ontology
CN113468524B (en) RASP-based machine learning model security detection method
CN107944270A (en) A kind of Android malware detection system and method that can verify that
CN112257077A (en) Automatic vulnerability mining method based on deep learning
CN115292674A (en) Fraud application detection method and system based on user comment data
CN116932381A (en) Automatic evaluation method for security risk of applet and related equipment
CN108171057B (en) Android platform malicious software detection method based on feature matching

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20170315

WD01 Invention patent application deemed withdrawn after publication