Research on Clue Mining in Criminal Cases of Smart Phone Trojan Horse under the Background of Information Security

Author:

Gang Li1,Wen Yong2ORCID

Affiliation:

1. Guangxi Police College, Nanning, Guangxi 530028, China

2. School of Artificial Intelligence, Guangxi University for Nationalities, Nanning, Guangxi 530006, China

Abstract

With the massive popularity and wide application of Android smartphones, there are more and more malware targeting Android smartphones. Research and analysis Android smart phone Trojan horses can provide corresponding technical support for malware detection on Android smart phones, which has good scientific research significance and broad market value. This work studies and analyzes the existing implantation technology of Android smart phone Trojans and analyzes the basic principles and implementation methods of obtaining root permissions on mobile phones. At the same time, the basic principles and implementation methods of mobile phone Trojan horse hiding are also studied. Through the research of the broadcast receiver model of the Android platform, the background monitoring principle and implementation technology of the mobile phone Trojan horse are analyzed, and the theoretical foundation and technical support are provided for the implementation of the Trojan horse background monitoring program in this article. Aiming at the problem of insufficient training corpus in the event relationship classification task, this work proposes an event relationship classification method based on tritraining. This method first trains three different classifiers based on the labeled dataset. In the collaborative training process, the new labeled event pairs used to expand each classifier are provided by the other two classifiers. For the same unlabeled event pair, the relationship prediction results are consistent; then, the event pair is considered to have a higher classification confidence and is placed in the labeled set of the third classifier after labeling. Finally, a well-trained classifier is used to determine the relationship between the pair of events to be tested by voting. This study constructs a weighted network structure model called the conceptual network and determines its upper weight based on the structural information and text data of the knowledge network. Aiming at the problem of the lack of means for mining-related forms between things, the pheromone strategy of absorbing the ant colony algorithm is proposed, and random walks are performed on the conceptual network. By analyzing the pheromone distribution information in the convergent state, the calculation of the semantic relevance is completed. At the same time, the method of semantic clue discovery is realized. The experimental results show that the human cognitive information contained in the knowledge network can meet the needs of the mining of the related forms of things, and the performance of the semantic correlation calculation method based on the convergence pheromone is close to other random walk methods based on the knowledge network.

Funder

Guangxi Higher Education Undergraduate Teaching Reform Foundation

Publisher

Hindawi Limited

Subject

General Computer Science,Control and Systems Engineering

Reference28 articles.

1. Environmental crimes in extractive activities: Explanations for low enforcement effectiveness in the case of illegal gold mining in Madre de Dios, Peru

2. Defining Crime: A multifaceted approach based on Lexicographic Relevance and Distributional Semantics

3. A method of mining key accounts from internet pyramid selling data;J. Xiong;Tehnički Vjesnik,2019

4. Trojan horse “digital education”–on the road to a conditioning institution set up in a school without teachers;P. Hensinger;Current Concerns,2017

5. Building the electronic evidence analysis model based on association rule mining and FP-growth algorithm

Cited by 1 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3