Font Size: a A A

Research And Implementation Of Android Cell Phone Safety Management Based On Snort

Posted on:2015-09-16Degree:MasterType:Thesis
Country:ChinaCandidate:X C LiuFull Text:PDF
GTID:2298330431483975Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the development of cell phone features, on the one hand, smart phonesfacilitate the users to handle more information; on the other hand, it also increases therisk of cell phone leakage. At the same time more and more people surfing the internet,which increases the risk of virus infection.The function of connecting to the internet has been increasingly advanced, whichincreases the invasion of the cell phones. Compared with computers, smart phones’prevention capability is weaker, and it’s easier to steal users’ information illegally. Atpresent, both the number and forms of threats are rapidly increasing. The dangers ofcell phone viruses are much greater than computer viruses, because cell phonepoisoning may lead to the loss of a huge bill. There are more than one billion cellphone users in China, the number of smart cell phone users develops quickly, andAndroid smart phones develop faster. It is more important to ensure cell phoneinformation security. Intrusion detection system comes into being.Snort is a lightweight network intrusion detection system developed by AmericanSourcefirea Company, which has been used well on Windows Operating System andLinux Operating System, and the multi-pattern matching algorithms it usually uses areAC algorithm and AC-BNFA algorithm. However, these algorithms are slow and takeup too much memory. This paper presents a new pattern matching algorithm, whichreduces the automaton states through transitions. The detection rate is ensured, thematch rate is accelerated, the memory footprint is reduced, and the detectionefficiency of the intrusion detection system is improved.First of all, this paper introduces Android Architecture, the establishment ofAndroid development environment, and Android development key techniques,including some of Android’s four components Activity, Service, Receiver, and SQLite,Adapter and so on, which expatiates this safety system’s basic techniques with key codes and characteristics.In the second, this paper discusses requirement analysis of Android cell phonesafety management based on Snort, and five basic modules including anti-theftmodule, backup recovery module, privacy zone module, local data module and systemtools module.Thirdly, this paper researches WM pattern matching algorithm and presentsTWM pattern matching algorithm to pick up speed.Then a new pattern matching algorithm is presented, which only compares thenew symbol string with previous symbol string, combines with Snort’s advantage,veracity is insured, the speed is increased, and the memory footprint is reduced.Finally, examination invalidation, building demonstration system, comparingwith the related system, and drawing results.
Keywords/Search Tags:Android, pattern matching, intrusion detection, Snort
PDF Full Text Request
Related items