A Novel Behavior-Based Virus Detection Method for Smart Mobile TerminalsReport as inadecuate

A Novel Behavior-Based Virus Detection Method for Smart Mobile Terminals - Download this document for free, or read online. Document in PDF available to download.

Discrete Dynamics in Nature and SocietyVolume 2012 2012, Article ID 262193, 12 pages

Research Article

School of Computer Science and Technology, Chongqing University of Posts and Telecommunications, Chongqing 400065, China

Department of Mathematics and Computer Science, Nicholls State University, Thibodaux, LA 70310, USA

Received 1 July 2012; Revised 2 August 2012; Accepted 4 August 2012

Academic Editor: Xiaofan Yang

Copyright © 2012 Yanbing Liu et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.


The security of smart mobile terminals has been an increasingly important issue in recent years. While there are extensive researches on virus detections for smart mobile terminals, most of them share the same framework of virus detection as that for personal computers, and few of them tackle the problem from the standpoint of detection methodology. In this paper, we propose a behavior-based virus detection method for smart mobile terminals which signals the existence of malicious code through identifying the anomaly of user behaviors. We first propose a model to collect and analyze user behaviors and then present a polynomial time algorithm for the virus detection. Next, we evaluate this algorithm by testing it with two commercial malwares and one malware written by ourselves and show that our algorithm enjoys a high virus detection rate. Finally, we notice that the rate of change of the virus detection rate of the algorithm with respect to thresholds matches the real-world situation of user behaviors, which indicates that the proposed algorithm is feasible.

Author: Yanbing Liu, Shousheng Jia, and Congcong Xing

Source: https://www.hindawi.com/


Related documents