首页 | 官方网站   微博 | 高级检索  
     

基于关联规则的Android驱动未知安全漏洞挖掘
引用本文:杨茹,王俊. 基于关联规则的Android驱动未知安全漏洞挖掘[J]. 科学技术与工程, 2018, 18(23)
作者姓名:杨茹  王俊
作者单位:内蒙古农业大学教务处;内蒙古农业大学计算机技术与信息管理系
摘    要:传统漏洞挖掘方法无法研究Android设备驱动与内核间的交互,且需使相关硬件处于工作状态,很难实现Android驱动未知漏洞挖掘。为此,提出基于关联规则的Android驱动未知安全漏洞挖掘方法。对关联规则漏洞挖掘问题进行形式化描述。依据Apriori法对频繁项集进行初寻找。采用RDARF规则筛选器对规则进行进一步筛选,获取强规则。建立待挖掘驱动样本库,对Android驱动进行自动化分析,考虑Android设备驱动与内核间的交互;针对各Android驱动对各自申请的权限信息进行提取,建立权限特征集合,完成格式化操作;挖掘出所有Android驱动漏洞数据的极大频繁项集,建立权限关系特征库,获取关联规则无需执行驱动;针对待挖掘驱动匹配权限关系特征库,实现未知Android驱动安全漏洞的挖掘。实验结果表明,所提方法挖掘准确性高,CPU占用少。

关 键 词:关联规则;Android驱动;未知;安全漏洞;挖掘;
收稿时间:2018-03-15
修稿时间:2018-05-05

Mining of Android driven unknown security vulnerabilities based on association rules
Yang Ru and. Mining of Android driven unknown security vulnerabilities based on association rules[J]. Science Technology and Engineering, 2018, 18(23)
Authors:Yang Ru and
Affiliation:Office of Academic Affairs,Inner Mongolia Agricultural University,
Abstract:Traditional vulnerability mining methods can not study the interaction between Android device drivers and cores, and make the relevant hardware in working state. It is difficult to achieve Android driving unknown vulnerabilities mining. To this end, a Android driven unknown security vulnerability mining method based on association rules is proposed. The problem of mining association rules is described in a formal way. The frequent itemsets are first searched according to the Apriori method. The rules are screened by RDARF rule filter, and strong rules are obtained. To set up mining driven sample database, the Android driver automatic analysis, consider the Android device driver interacts with the kernel; for the Android drive to access their information for the extraction, establish permissions feature set to complete the formatting operation; to find all Android driver maximum frequent itemsets of vulnerability data, establish the authority relation feature library and the acquisition of association rules without the need to perform driving; for driving, the relationship between the characteristics of mining rights library, mining unknown security vulnerabilities in Android driver. The experimental results show that the accuracy of the proposed method is high and the CPU is less occupied.
Keywords:association rules   Android drive   unknown   security vulnerability   mining  
本文献已被 CNKI 等数据库收录!
点击此处可从《科学技术与工程》浏览原始摘要信息
点击此处可从《科学技术与工程》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号