Abstract

With the massive popularity and wide application of Android smartphones, there are more and more malware targeting Android smartphones. Research and analysis Android smart phone Trojan horses can provide corresponding technical support for malware detection on Android smart phones, which has good scientific research significance and broad market value. This work studies and analyzes the existing implantation technology of Android smart phone Trojans and analyzes the basic principles and implementation methods of obtaining root permissions on mobile phones. At the same time, the basic principles and implementation methods of mobile phone Trojan horse hiding are also studied. Through the research of the broadcast receiver model of the Android platform, the background monitoring principle and implementation technology of the mobile phone Trojan horse are analyzed, and the theoretical foundation and technical support are provided for the implementation of the Trojan horse background monitoring program in this article. Aiming at the problem of insufficient training corpus in the event relationship classification task, this work proposes an event relationship classification method based on tritraining. This method first trains three different classifiers based on the labeled dataset. In the collaborative training process, the new labeled event pairs used to expand each classifier are provided by the other two classifiers. For the same unlabeled event pair, the relationship prediction results are consistent; then, the event pair is considered to have a higher classification confidence and is placed in the labeled set of the third classifier after labeling. Finally, a well-trained classifier is used to determine the relationship between the pair of events to be tested by voting. This study constructs a weighted network structure model called the conceptual network and determines its upper weight based on the structural information and text data of the knowledge network. Aiming at the problem of the lack of means for mining-related forms between things, the pheromone strategy of absorbing the ant colony algorithm is proposed, and random walks are performed on the conceptual network. By analyzing the pheromone distribution information in the convergent state, the calculation of the semantic relevance is completed. At the same time, the method of semantic clue discovery is realized. The experimental results show that the human cognitive information contained in the knowledge network can meet the needs of the mining of the related forms of things, and the performance of the semantic correlation calculation method based on the convergence pheromone is close to other random walk methods based on the knowledge network.

Highlights

  • With the development and prosperity of the mobile Internet, smart phones have gradually become an indispensable tool in our daily lives due to their powerful computing power and portability [1]

  • Open, free, and other features of the Android platform have brought a lot of market share, it brings many security risks to smartphone users. e makers of smartphone Trojan horses can implant malicious code in normal mobile phone Journal of Robotics applications and release applications bundled with mobile phone Trojan horses on the Android platform arbitrarily [2, 3]

  • In 2020, the number of Android smartphone users infected by malware exceeded 10 million, making it the hardest hit area for mobile Trojan horses. e total number of new malware for Android mobile phones in China exceeds 3,000

Read more

Summary

Introduction

With the development and prosperity of the mobile Internet, smart phones have gradually become an indispensable tool in our daily lives due to their powerful computing power and portability [1]. Ere are many existing network information security control systems, which can monitor and rectify various network information security issues that may have occurred in the past. These methods have different degrees of limitations and deficiencies for today’s huge amount of data [7]. It studies the hiding technology of mobile phone Trojans, analyzes the basic principles and implementation methods of file hiding, process hiding, network connection hiding, and kernel module hiding, and analyzes the basic methods of communication hiding technology and collaborative hiding. En, by analyzing the broadcast receiver model of the Android platform, the background monitoring principle and technology of the mobile phone Trojan horse are studied and analyzed. The calculation results of the semantic relevance calculation model are compared with similar algorithms, and the results show that the model has better calculation accuracy; in addition, the stability of the semantic clue mining model is tested, and the results show that the effective path distribution of the model’s feedback is in line with expectations and has basic stability

Related Work
Methods
Results and Analysis
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call