Research Article
Power Intelligent Terminal Intrusion Detection Based on Deep Learning and Cloud Computing
Table 1
Malware application permission and its description.
| Malicious software | Important sensitive permissions | Describe | Index |
| ADED | INTERNET, ACCESS_NETWOEK_STATE, R | Worm | 0.315 | ECEIVE_BOOT_COMPLETED | DeoidDewam | CHANGE_WIFI_STATE | Root uses a Trojan horse to raise rights | 1.213 | Bgserv | INTERNET, ERCEIVE_SMS, SEND_SMS | Worm | 0.315 | DroidDreamLight | INTERNET, READ_PHONE_STATE | Information stealing Trojan | 1.521 | Genimi | INTERNET, SEND_SMS | Worm | 0.315 | Pjapps | INTERNET, RECEIVE_SMS | Worm | 0.315 | Zsone | RECEIVE_SMS, SEND_SMS | Send SMS maliciously | 0.625 |
|
|