全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...
-  2016 

Android系统移动支付保护方案与实现 Research and implementation about mobile-payment protection scheme on Android system

Keywords: Android系统,移动支付,恶意检测,系统调用

Full-Text   Cite this paper   Add to My Lib

Abstract:

针对目前亟待解决的移动支付保护问题,以主流手机操作系统Android为研究平台,提出一种对基于移动支付行为检测的移动支付保护方案.该方案以Android系统中移动支付的行为特征作为研究出发点,使用内核层系统调用作为行为检测的度量单位.同时考虑系统环境因素的影响,将获取系统资源消耗作为辅助评估支付行为,根据对当前主流的基于系统调用的恶意行为检测算法的研究和分析,构建一个结合KNN算法和贝叶斯信念网络的模型来进行恶意行为检测,并通过实验证明该方案的有效性

References

[1]  Chen W D,Hancke G P,Mayes K E,et al.Using3Gnetwork components to enable NFC mobile transactions and authentication[C]//Progress in Informatics and Computing(PIC),2010IEEE International Conference on,IEEE,2010,1:441-448.
[2]  Aafer Y,Du W,Yin H.DroidAPIMiner:Mining API-level features for robust malware detection in android[C]//Security and Privacy in Communication Networks.Springer International Publishing,2013:86-103.
[3]  陈华平,唐军.移动支付的使用者与使用行为研究[J].管理科学,2006,19(6):48-55.Chen Huaping,Tang Jun.Research of mobile payment user and user behavior[J].China Business and Market,2006,19(6):48-55.
[4]  Zhang H,Berg A C,Maire M,et al.SVM-KNN:Discriminative nearest neighbor classification for visual category recognition[C]//Computer Vision and Pattern Recognition,2006IEEE Computer Society Conference on,IEEE,2006,2:2126-2136.
[5]  Padala P.Playing with ptrace,Part I[J].Linux Journal,2002,(103):5.
[6]  Peng H,Long F,Ding C.Feature selection based on mutual information criteria of max-dependency,maxrelevance,and min-redundancy[J].Pattern Analysis and Machine Intelligence,IEEE Transactions on,2005,27(8):1226-1238.
[7]  Mobile Payment Forum,Ltd.Mobile payment forum white paper[R].http://www.mobilepaymentforum.org
[8]  岳云康.我国电子商务环境下的移动支付问题研究[J].中国流通经济,2008,(1):40-43.Yue Yunkang.Research of mobile payment in the light of China’s E-commerce[J].China Business and Market,2008,(1):40-43.
[9]  Fun T S,Beng L Y,Likoh J,et al.A lightweight and private mobile payment protocol by using mobile network operator[C]//Computer and Communication Engineering,2008.ICCCE 2008.International Conference on.IEEE,2008:162-166.
[10]  Chen W,Hancke G P,Mayes K E,et al.NFC mobile transactions and authentication based on GSM network[C]//Near Field Communication(NFC),2010 Second International Workshop on,IEEE,2010:83-89.
[11]  Ye Y,Li T,Jiang Q,et al.CIMDS:Adapting postprocessing techniques of associative classification for malware detection[J].Systems,Man,and Cybernetics,Part C:Applications and Reviews,IEEE Transactions on,2010,40(3):298-307.
[12]  腾讯科技.移动互联网安全隐忧谁买单[J/OL].CCF电子刊,2014-04-09.http://www.ccf.org.cn/sites/ccf/nry.jsp?contentId=2792419241153
[13]  Jacoby G A,Davis IV N J.Battery-based intrusion detection[C]//Global Telecommunications Conference,2004.GLOBECOM’04.IEEE.IEEE,2004,4:2250-2255.
[14]  Shedid S M,Kouta M.Modified SET protocol for mobile payment:an empirical analysis[C]//Software Technology and Engineering(ICSTE),2010 2nd International Conference on,IEEE,2010,1:350-355.
[15]  Chiang H S,Tsaur W.Mobile malware behavioral analysis and preventive strategy using ontology[C]//Social Computing(SocialCom),2010IEEE Second International Conference on,IEEE,2010:1080-1085.
[16]  Shabtai A.Malware detection on mobile devices[C]//Mobile Data Management,2010:289-290.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133