Font Size: a A A

Research And Implemention Of Mobile Data Malicious Behavhior Detection Base On Distributed Computing

Posted on:2016-09-18Degree:MasterType:Thesis
Country:ChinaCandidate:P C LiuFull Text:PDF
GTID:2298330467491876Subject:Computer technology
Abstract/Summary:PDF Full Text Request
In recent years, with the rapid development of mobile Internet, mobile security threats posted by mobile malwares also intensified. Current security detection technology for client-side behavior is relatively mature, but hidden features in the mobile network traffic are rarely applied in mobile malware detection. As the main expression of malware malicious behavior, network data based detection will play an important role in mobile security detection field, however, it will face the big data processing problem under mobile Internet environment. So the research in mobile data malicious behavior detection of big data environment is of important significance in promoting the development of mobile Internet security research.According to the characteristics of the mobile Internet malware network traffic and actual demand of detection environment, this paper studied the behavior of mobile malware and focused on its network behavior characteristics, on the basis of which, It proposed a byte frequency distribution similarity based distributed detection method on malware http network traffic, and finally implemented the distributed computing based mobile data malicious behavior detection system.The main work of this paper is as follows:1) Studied and analyzed current mobile malwares, and summarized the attack mechanism, transmission of mobile malware and their behavior characteristcs, among which, focused on the network features of mobile malwares. 2) Designed a detection mehod for mobile data malicious behavior which based on distributed computing technology and byte frequency similarity algorithm. This method conducts mining analysis focused on http communiction network traffic of mobile malware, and has the advantages of fast and efficient, low false alarm rate and etc. This method also adopted the distributed server-side analyzing manner to avoid resources consumption brought by client-side detection.3) Designed and implemented the distributed computing based mobile data malicious behavior detection system according to distributed computing theory and related algorithms, elaborated the principles and implemention of each module, and finally conducted experiments to test the system.
Keywords/Search Tags:Mobile Data, Network Behavior Characteristics, ByteFrequency Similarity, Distributed Computing
PDF Full Text Request
Related items