Study on the Method of Android System Cloud Monitoring Information Based on SVM

Article Preview

Abstract:

In recent years, android system has become a mobile device is especially preferred intelligent mobile phone operating system, like Microsoft window system, Android operating system is also subject to a variety of mobile phone viruses, Trojans and other malicious software attacks, resulting in the leakage of personal information, the harm of spam messages continuously, in order to solve these problems in this paper for the known virus Trojan cloud monitoring and detecting light client burden increase sample detection efficiency; using SVM to unknown trojan virus (support vector machine) short sequences of API function calls the LINUX classification, analysis of the API function of each call with precise improve classification support vector machine the danger coefficient after integration, to distinguish the Trojan virus, in order to achieve information security protection system role.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2272-2275

Citation:

Online since:

August 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Zhang Boyun, Yin Jianping, Hao Jing wave computer virus detection system based on SVM [J]. Computer engineering and science 2007second volume ninth issue.

Google Scholar

[2] Wang Xiaoyan, Jin Cong, Hua Yong [J]. computer engineering andapplication of Win32 API and SVM of unknown virus detection based on, 201147 (7): 125.

Google Scholar

[3] Li Lizhao. Analysis and research of [J], cloud computing and its security problems of the Silicon Valley, 2010. 10: 196.

Google Scholar

[4] Liu Wei. A discussion on the security of cloud computing service systemand the key technology of [J], the financial China computer, 2011. 05: 76.

Google Scholar

[5] Zhang Weikuang. The cloud era enterprise competitive intelligence security always and Countermeasures [J], Journal of information, 2011. 07: 8.

Google Scholar

[6] Jay on cloud security [J]. information system engineering, 2009 (8): 58-61.

Google Scholar