Research Article

Power Intelligent Terminal Intrusion Detection Based on Deep Learning and Cloud Computing

Table 1

Malware application permission and its description.

Malicious softwareImportant sensitive permissionsDescribeIndex

ADEDINTERNET, ACCESS_NETWOEK_STATE, RWorm0.315
ECEIVE_BOOT_COMPLETED
DeoidDewamCHANGE_WIFI_STATERoot uses a Trojan horse to raise rights1.213
BgservINTERNET, ERCEIVE_SMS, SEND_SMSWorm0.315
DroidDreamLightINTERNET, READ_PHONE_STATEInformation stealing Trojan1.521
GenimiINTERNET, SEND_SMSWorm0.315
PjappsINTERNET, RECEIVE_SMSWorm0.315
ZsoneRECEIVE_SMS, SEND_SMSSend SMS maliciously0.625