Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Android application threat degree evaluation model establishing method, evaluation method and system

A technology for evaluating models and establishing methods, applied in the computer field, can solve the problems of low accuracy and lack of universality of Android application threat evaluation, and achieve the effect of improving universality, classification accuracy, and high-precision detection.

Inactive Publication Date: 2018-10-30
INST OF INFORMATION ENG CHINESE ACAD OF SCI
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to solve the problems of low accuracy and non-universal applicability of the existing Android application threat evaluation, the embodiment of the present invention provides a method for establishing an Android application threat evaluation model, an evaluation method and a system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Android application threat degree evaluation model establishing method, evaluation method and system
  • Android application threat degree evaluation model establishing method, evaluation method and system
  • Android application threat degree evaluation model establishing method, evaluation method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0021] figure 1 It is a flowchart of a method for establishing an Android application threat evaluation model provided by an embodiment of the present invention. Such as figure 1 As shown, the method includes:

[0022] Step 101, extract feature data of training samples according to a preset preprocessing algorithm, the training samples include ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the present invention provide an Android application threat degree evaluation model establishing method, evaluation method and system. The model establishing method comprises: extracting feature data, including authority information and additional feature information of training samples, and constructing feature vectors according to the state of the feature data; using a clusteringalgorithm to cluster a feature vector set of the training samples according to the authority information, and dividing the feature vector set into different feature vector clusters to obtain a clustering algorithm model; using a data dimension reduction algorithm to perform feature selection on feature vectors in the feature vector clusters, and obtaining a corresponding feature selection dictionary; classifying feature vectors in the feature vector clusters by using multiple preset machine learning algorithms; obtaining a corresponding machine learning algorithm according to a classificationresult to obtain a classification algorithm model; and establishing an Android application threat degree evaluation model according to the preprocessing algorithm, the clustering algorithm model, thefeature selection dictionary and the classification algorithm model. According to the embodiments of the present invention, the classification accuracy and universality of the application threat degree evaluation are improved.

Description

technical field [0001] The embodiments of the present invention relate to the field of computer technology, and in particular to a method for establishing an Android application threat assessment model, an assessment method and a system. Background technique [0002] In recent years, with the development of smart terminal devices, especially smart phones, applications on smart terminals have become more and more abundant, which greatly facilitates people's lives. With the explosive growth of smartphone users, the number of malicious apps is also growing. Malicious apps have become a major threat to users' property, security, and privacy. [0003] In terms of detection of malicious applications, in the paper Quantitative Security Risk Assessment of Android Permission and Applications, the Bayesian formula is used to generate the probability P (A is malicious|pi) that a sample A under a certain permission may be malicious. The weighted sum of all Ps is the threat degree of t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56G06K9/62
CPCG06F21/56G06F18/23213G06F18/2135G06F18/2411
Inventor 刘超喻民李松姜建国黄伟庆
Owner INST OF INFORMATION ENG CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products