Method and system for malware network behavior detection based on access router

A malicious software and router technology, applied in transmission systems, electrical components, etc., can solve problems at the technical level, achieve the effect of enhancing detection capabilities and solving deployment difficulties

Active Publication Date: 2018-10-23
UNIV OF JINAN
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This technology uses network traffic to detect whether a user has installed malware on a mobile terminal, but this technology only stays at the technical level, and there is no actual carrier that implements this technology to complete the entire detection process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for malware network behavior detection based on access router
  • Method and system for malware network behavior detection based on access router
  • Method and system for malware network behavior detection based on access router

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0069] The present invention is described in detail below in conjunction with accompanying drawing:

[0070] Based on the existing wireless router with malware network behavior discovery capability, the present invention deploys the novel router in a local area network environment, and realizes detection of malware by using network flow of a mobile terminal. First, the user connects wirelessly to a wireless router with malware network behavior detection capabilities, and passes the security verification; second, when the user's mobile terminal accesses the external network through the router, the tcpdump tool installed in the router system collects The interactive traffic between the user's mobile terminal device and the external network; then, the router's behavior analysis module reads and analyzes the collected network traffic. If malicious traffic is detected and analyzed, it means that malicious applications are installed on the user's mobile terminal device , feedback th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and system for performing malicious software network behavior detection based on an access router. The method comprises the following steps that: a wireless router identifies an accessing mobile terminal, agrees to a networking request of the accessing mobile terminal, starts to capture flow generated by networking of the mobile terminal, transmits the acquired network flow into a flow behavior analysis module, and performs flow-based security detection; a detection model server establishes a detection model through flow data, and stores the detection model; the detection model server periodically updates the flow behavior analysis module accessing the router to enhance security protection of the access router; and the wireless router selects a required detection model, and the detection model starts to process input flow data and outputs a detection result. Through adoption of the method and the system, the problem of high resource consumption of the mobile terminal due to installation of detection programs in the mobile terminal by a user is solved. Meanwhile, the problem of large-scale deployment in actual use is solved.

Description

technical field [0001] The invention relates to a method and a system for detecting malicious software network behaviors based on access routers. Background technique [0002] With the widespread use of mobile terminals, especially the rapid popularization of smart phones, mobile smart terminals have brought great changes to modern society. Since entering the 21st century, we have quickly entered the mobile era. The mobile phone is no longer limited to communication services in the traditional sense, but has become a powerful terminal integrating e-commerce, personal payment, social entertainment and other functions. According to Gartner's report statistics, in 2014, the global mobile phone market has reached 3.5 billion units (including 2.7 billion Android systems), which has exceeded the number of PCs, and it is predicted that by 2015 it will exceed 5 billion units. However, with the popularity of mobile applications and the explosive growth of the number of users, the se...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/1408H04L63/145
Inventor 陈贞翔韩泓波杨波彭立志张蕾王闪闪
Owner UNIV OF JINAN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products