Font Size: a A A

The Design And Application Of Mobile Malware Management System In Colleges And Universities

Posted on:2017-02-24Degree:MasterType:Thesis
Country:ChinaCandidate:W WenFull Text:PDF
GTID:2348330488477163Subject:Software engineering
Abstract/Summary:PDF Full Text Request
The problem the mobile phone malicious software management system of is that on one hand, this system is lack of systematic deployment, there will be a large number of data interface between all kinds of systems, which directly leads to the reduction of data sharing ability. On the other hand, the Android platform mobile malware investment, missing data or incomplete, extremely easy to cause duplication of investment and inefficient investment, not to mention the usage data analysis approach to scientific and effective management of colleges and universities mobile malicious resources.This paper focuses on Android malware hazards according to the network side and the terminal side are discussed, respectively. At the same time of malicious software static and dynamic sampling method of basic research, and detection technology, including the character code scan technology, and heuristic detection measurement technology research and the advantages and disadvantages of the analysis. Finally, the comprehensive prevention and control measures of the malicious software from the network side and the terminal side of the point of view are described.The in the detailed design and the realization, through a careful analysis of each scheme. The paper finally determine the final implementation scheme through detection and the geographical position information and mobile APK content, Internet URL and text input, and on the scheme of the software in a monitoring module, a detailed description. Finally, the paper gives the results of software testing and the corresponding screen shots, at the same time, on this basis, the paper summed up the whole issue, and then gives the software to further improve the direction. System uses a hierarchical structure design, the function module is divided into acquisition layer, business layer and application layer, and on this basis for the development and maintenance, to achieve the separation of data processing, business logic and data display. In the collection layer, the system design of the sample collection module. The sample collection module collects the sample files from various data sources, and carries on the preliminary format checking to the documents and carries on the heavy work to the sample documents which had been analyzed. In the business layer, the system design of the sample scanning module. Through the sample scanning module parses the APK file to extract the digital signature of the file, the information such as the authority statement, on the DEX file of decompilation, on sensitive API and code were scanned finally samples are classified and filtering. In the application layer, system design of the sample analysis and management of web system, including the systematic realization of artificial management process analysis, and to virus library daily management and virus database release process in a systematic implementation.
Keywords/Search Tags:Android, Young people, Internet behavior, Malicious software, Hierarchical design
PDF Full Text Request
Related items