System and method for detecting mobile cyber incident

ABSTRACT

A system for detecting mobile cyber incidents includes: a mobile incident collection server adapted to collect text messages sent through communication company servers to produce text message detection information, to collect URL information based on real-time search words provided by search portals to produce URL detection information, and to collect basic information of application files being sold in application market servers to produce APK detection information; and a detection information DB adapted to receive, store and manage the text message detection information, the URL detection information and the APK detection information produced from the mobile incident collection server.

CROSS REFERENCE TO RELATED APPLICATION

The present application claims the benefit of Korean Patent ApplicationNo. 10-2015-0006948 filed in the Korean Intellectual Property Office onJan. 14, 2015, the entire contents of which are incorporated herein byreference.

BACKGROUND OF THE INVENTION

1. Field of the Invention

The present invention relates to a system and method for detectingmobile cyber incidents, and more particularly, to a system and methodfor detecting mobile cyber incidents that collects information on all ofpaths through which mobile malicious codes spread to detect the mobilecyber incidents generated from the mobile malicious codes.

2. Background of the Related Art

Recently, mobile terminal users have been drastically increased. Thepopulations using mobile terminals in the first quarter of 2014 reachabout 6.8 billion all over the world, and especially, the number of newmobile users in 2013 is 2 billion. The mobile terminal users aredrastically increased because internet is freely used without anylimitations in time and space and the friendliness among the users isimproved through services like SNS. Further, they obtain manyconveniences like financial service availability, free service couponsissuing and so on through simple procedures.

Recent mobile terminals, which provide conveniences through variousapplications and support fast internet services, are called‘smartphones’.

Such smartphones store and manage various kinds of personal information.That is, they store telephone numbers, text messages, bank accountnumbers for financial services, password numbers, authenticatedcertificates, card numbers and the like.

Like this, since the smartphones store various kinds of personalinformation therein, they may be attacked by hackers, but unfortunately,the smartphone users do not recognize the attacks from the hackers well.

According to Kaspersky Lab, PC and mobile malicious code analyzingcompany, the mobile malicious codes found in the second quarter of 2014are 65,118, and the APK files installing the malicious codes are727,790.

The malicious codes operating for mobile banking among the mobilemalicious codes are 2,033. The number of total mobile malicious codes islower than that in the first quarter of 2014, but the number of mobilebanking malicious codes is greater by two times than in the firstquarter of 2014. More than 90% of the mobile banking malicious codes arefound in Russia, and even in Korea, 30 mobile banking malicious codesare detected.

Accordingly, the incidents using the mobile malicious codes have beenincreased, and they are handled with mobile vaccine. The mobile vaccineanalyzes the mobile malicious codes, creates information for detectingthe mobile malicious codes, transmits the information to a user, andprovides a function of detecting the malicious codes. However, actually,most of mobile users do not use the mobile vaccine.

According to Korea Internet & Security Agency, it is investigated thatonly about 33.5% of the mobile terminal users adopt mobile vaccine. Soas to make a vaccine signature detecting mobile malicious codes,specific information on the malicious codes should be extracted throughmanual analysis of analyzers. Further, a method for deleting thedetected malicious codes should be found and sent to the user.

However, lots of systems for collecting the mobile malicious codes to bechecked do not exist. At present, the mobile applications suspected onmalicious behaviors are received from a user or the applicationssuspected in application market are collected. The systems forcollecting the mobile malicious codes by means of the sharing of theapplication through downloading, black markets and blogs have been notsufficient. Accordingly, the attackers who spread the mobile maliciouscodes insert download link into web sites or connect applicationdownload addresses through SMS/MMS.

Moreover, the collected applications are analyzed directly by analyzers,and accordingly, the number of collected applications to be analyzed islimited. The system assisting the analysis has been recently developedas a tester, and further, the determination whether malicious behaviorexists in the analyzed results of the system has to be made by theanalyzers.

SUMMARY OF THE INVENTION

Accordingly, the present invention has been made in view of theabove-mentioned problems occurring in the prior art, and it is an objectof the present invention to provide a system and method for detectingmobile cyber incidents that collects information on all of paths throughwhich mobile malicious codes spreads to detect the mobile cyberincidents generated from the mobile malicious codes.

It is another object of the present invention to provide a system andmethod for detecting mobile cyber incidents that informs applicationssuspected on malicious behavior and the information on the applicationsto a manager and conducts manual analysis only for the suspectedapplications.

To accomplish the above-mentioned objects, according to a first aspectof the present invention, there is provided a system for detectingmobile cyber incidents, the system including: a mobile incidentcollection server adapted to collect text messages sent throughcommunication company servers to produce text message detectioninformation, to collect URL information based on real-time search wordsprovided by search portals to produce URL detection information, and tocollect basic information of application files being sold in applicationmarket servers to produce APK detection information; and a detectioninformation DB adapted to receive, store and manage the text messagedetection information, the URL detection information and the APKdetection information produced from the mobile incident collectionserver.

According to the present invention, preferably, the APK detectioninformation includes at least one or more of application names,versions, sizes, uploader names, and authorization information.

According to the present invention, preferably, when the mobile incidentcollection server produces the text message detection information, themobile incident collection server is accessed to the corresponding webpages by using the URL information contained in the text messages tocheck whether applications in the web pages are downloaded.

According to the present invention, preferably, when the mobile incidentcollection server collects the basic information of the applicationsbeing sold in the application market servers, the mobile incidentcollection server analyzes the relation between the collectedapplications and the previously analyzed applications to check whetherthe applications are repeated.

According to the present invention, preferably, the mobile incidentcollection server checks whether the collected applications are repeatedwith the previously analyzed applications on the basis of at least oneor more information of the application names, versions, uploader names,and URL information.

To accomplish the above-mentioned objects, according to a second aspectof the present invention, there is provided a method for detectingmobile cyber incidents, the method including the steps of: allowing amobile incident collection server to determine whether new text isreceived; extracting the text original hash from the received new textby means of the mobile incident collection server; allowing the mobileincident collection server to determine whether attached file exists onthe basis of the extracted text original hash; if the attached fileexists, extracting the attached file by means of the mobile incidentcollection server; and storing and managing the APP information of theextracted attached file as mobile cyber incident information in themobile incident collection server.

According to the present invention, preferably, the method for detectingmobile cyber incidents further includes the steps of: extracting textsending information on the basis of the extracted text original hash bymeans of the mobile incident collection server; and extracting sendingnumber, time, communication company and main phrases from the extractedtext sending information and storing and managing the extractedinformation as the mobile cyber incident information in the mobileincident collection server.

According to the present invention, preferably, the method for detectingmobile cyber incidents further includes the steps of: extracting thetext content from the extracted text original hash by means of themobile incident collection server; parsing the URL of the extracted textcontent by means of the mobile incident collection server; and storingand managing the parsed information as the mobile cyber incidentinformation in the mobile incident collection server.

To accomplish the above-mentioned objects, according to a third aspectof the present invention, there is provided a method for detectingmobile cyber incidents, the method including the steps of: allowing amobile incident collection server to determine whether a search wordcollection period starts; if the search word collection period starts,calling a real-time search word collection API by portal by means of themobile incident collection server; calling the number of search words bymeans of the mobile incident collection server; collecting the API-basedreal-time search words by portal by means of the mobile incidentcollection server; parsing the collected search words by means of themobile incident collection server; and storing and managing the parsedsearch words as the mobile cyber incident information in the mobileincident collection server.

To accomplish the above-mentioned objects, according to a fourth aspectof the present invention, there is provided a method for detectingmobile cyber incidents, the method including the steps of: allowing amobile incident collection server to determine whether a URL detectionperiod starts; if the URL detection period starts, calling a search APIby portal by means of the mobile incident collection server; callingcollected search words by means of the mobile incident collectionserver; receiving the search results through the collected search wordsby means of the mobile incident collection server; parsing the searchresults and extracting the URL information from the parsed searchresults by means of the mobile incident collection server; allowing themobile incident collection server to determine whether the search wordsnot searched exist; and if the search words not searched exist,receiving the search results corresponding to the search words notsearched by means of the mobile incident collection server.

According to the present invention, preferably, the method for detectingmobile cyber incidents further includes the steps of: after the mobileincident collection server parses the search results and extracts theURL information from the parsed search results, calling URL repetitioncollection limitation period by means of the mobile incident collectionserver; allowing the mobile incident collection server to determinewhether URLs are collected; if the URLs are collected, allowing themobile incident collection server to determine whether the collectedURLs are the repetition collection limitation URLs; if it is determinedthat the collected URLs are the repetition collection limitation URLs,producing and storing URL and hash by means of the mobile incidentcollection server; and storing the basis information and settingrepetition collection limitations by means of the mobile incidentcollection server.

According to the present invention, preferably, the method for detectingmobile cyber incidents further includes the steps of: analyzing the webpage source of the extracted URL and extracting the URL downloading theapplication connected to the corresponding web page by means of themobile incident collection server.

According to the present invention, preferably, the method for detectingmobile cyber incidents further includes the steps of: checking whetherthe URL is connected to other web pages by means of the mobile incidentcollection server; and allowing the mobile incident collection server todetermine whether the URL automatically visits the corresponding webpage to download the applications connected to the web page.

According to the present invention, preferably, the method for detectingmobile cyber incidents further includes the step of: allowing the mobileincident collection server to check whether the collected applicationsare repeated with each other to check the relations of the collectedapplications with the existing analyzed applications.

According to the present invention, preferably, the relations of thecollected applications with the existing analyzed applications arechecked to check whether at least one or more information of theapplication names, versions, uploader names, and URL information aresimilar to or the same as each other.

BRIEF DESCRIPTION OF THE DRAWINGS

The above and other objects, features and advantages of the presentinvention will be apparent from the following detailed description ofthe preferred embodiments of the invention in conjunction with theaccompanying drawings, in which:

FIG. 1 is a block diagram showing a system for detecting mobile cyberincidents according to the present invention;

FIG. 2 is a block diagram showing the configuration for text messageprocessing and text content extraction of a mobile incident collectionserver of FIG. 1;

FIG. 3 is a flow chart showing a text message collection routine in amethod for detecting mobile cyber incidents according to the presentinvention; and

FIG. 4 is a flow chart showing a search portal-based URL collectionroutine in the method for detecting mobile cyber incidents according tothe present invention.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS

Before the present invention is disclosed and described, it is to beunderstood that the disclosed embodiments are merely exemplary of theinvention, which can be embodied in various forms. Therefore, specificstructural and functional details disclosed herein are not to beinterpreted as limiting, but merely as a basis for the claims and as arepresentative basis for teaching one of ordinary skill in the art tovariously employ the present invention in virtually any appropriatelydetailed structure. Further, if the terminologies used herein fail toaccurately indicate the scope of the invention, they should be replacedwith the terminologies understood correctly by those skilled in the art.Furthermore, the terminologies used herein should be interpretedaccording to the context under the definition of the dictionary, andaccordingly, they are not interpreted as meaning reduced excessively.

The terminology used herein is for the purpose of describing particularembodiments only and is not intended to be limiting. The term ‘a’ or‘an’, as used herein, are defining as one or more than one. The term‘including’ and/or ‘having’, as used herein are intended to refer to theabove features, numbers, steps, operations, elements, parts orcombinations, and it is to be understood that the terms are not intendedto preclude the presence of one or more features, numbers, steps,operations, elements, parts or combinations and added possibilities.

The present invention is disclosed with reference to the attacheddrawings wherein the corresponding parts in the embodiments of thepresent invention are indicated by corresponding reference numerals andthe repeated explanation on the corresponding parts will be avoided. Ifit is determined that the detailed explanation on the well knowntechnology related to the present invention makes the scope of thepresent invention not clear, the explanation will be avoided for thebrevity of the description.

FIG. 1 is a block diagram showing a system for detecting mobile cyberincidents according to the present invention.

As shown in FIG. 1, a system for detecting mobile cyber incidentsaccording to the present invention includes: a mobile incidentcollection server 500 adapted to collect text messages sent throughcommunication company servers 100 to produce text message detectioninformation, to collect URL information based on real-time search wordsprovided by search portals 200 to produce URL detection information, andto collect basic information of application files being sold in playstores 300 and black markets 400 to produce APK detection information; adetection information DB 600 adapted to receive, store and manage thetext message detection information, the URL detection information andthe APK detection information produced from the mobile incidentcollection server 500; a manager terminal 700 adapted to providecollection conditions for collecting detection information to the mobileincident collection server 500; and a communication network 800 adaptedto build communication environments among the mobile incident collectionserver 500, the communication company servers 100, the search portals200, the play stores 300, the black markets 400, the detectioninformation DB 600 and the manager terminal 700.

The APK detection information includes application names, versions,sizes, uploader names, and authorization information.

When the mobile incident collection server 500 produces the text messagedetection information, it is accessed to the corresponding web page byusing the URL information contained in the text message to check whetheran application is downloaded or not.

When the mobile incident collection server 500 collects the basicinformation of the applications being sold in the play stores 300 andthe black markets 400 as application market servers, it analyzes therelation between the collected applications and the previously analyzedapplications to check whether they are repeated with each other.

The mobile incident collection server 500 checks whether the collectedapplications are repeated with the previously analyzed applications onthe basis of the application names, versions, uploader names, and URLinformation.

Referring schematically to FIG. 2 showing the configuration for textmessage processing and text content extraction in the mobile incidentcollection server 500, an input interface 510 receives text messagessent through spam management servers (not shown) or the communicationcompany servers 100 to provide the text messages to a new text check andcollection module 520 through a mobile spam DB addition access module530.

Further, the input interface 510 receives manager input through themanager terminal 700 to provide the manager input to a URL and textmessage collection module 540.

The input interface 510 can receive the text messages through anexternal system (not shown). At this time, the external system receivestexts reported as spam from an SMS spam trap system built in KISC andthe communication company servers 100.

Further, the input interface 510 receives the web interface input of themanager and the text file input of the system.

The text messages collected from the external system like thecommunication company servers 100 are received as text files in unit oftime, and each text message is indicated by one line and filled in theorder of the collected time from the external system, sender telephonenumber, sender communication company, and text message content. Theinformation is divided into TAB, and upon the development of system, theinformation can be extracted on the basis of TAB (\t) and line breaking(\n).

If the mobile spam DB addition access module 530 collects the originalcopies of the text messages using the input interface 510, theinformation is collected in the unit of every time, checks theconnection of the external system in the unit of every time, selects theoriginal copies of the text messages from the table in which the textmessages are stored after the connection is checked, and receives theselected information.

The new text check and collection module 520 periodically checks whetherthe information received from the external system exists or not, and ifthere is no file recently produced after the collection time on thebasis of DB new information and FTP new creation file (which correspondsonly to an FTP system), the new text check and collection module 520checks the file production in the unit of every five minutes.

A new text identification information extraction and storage module 550checks the original copies of the text messages to input the informationneeded by the system to DB and applies ID to the text messages of theindex table for the text messages. At this time, time information,sender telephone number information, and communication companyinformation are extracted and inputted to the DB.

A text content extraction and storage module 560 extracts text messagecontent information, performs URL extraction, issues and stores URLindex ID, extracts only the contents from the original copies of thetext messages collected to produce and manage separate hash values,checks whether the phrases related to URL from the extracted texts existor not, and if similar information using start information of URL ischecked, transmits the similar information to a URL information parsingmodule 570.

The URL information parsing module 570 checks the URL informationexisting in the text messages to extract the URL phrases, starts URLdetection if a given string exists through the check of the startportion of the URL, checks the string after the URL detection hasstarted to check the ending point of the URL, selects the string whoseURL detection is finished as an URL phrase, issues URL index to theselected URL phrase, manages repeated information, and checks whethershortened URL exists or not.

Under the above-mentioned configuration, an explanation on a method fordetecting mobile cyber incidents will be given with respect to FIGS. 3and 4.

(Text Message Collection Routine)

FIG. 3 is a flow chart showing a text message collection routine in amethod for detecting mobile cyber incidents according to the presentinvention.

As shown in FIG. 3, a text message collection routine in a method fordetecting mobile cyber incidents according to the present invention iscarried out by allowing the mobile incident collection server 500 todetermine whether new text is received (at step S105) and extracting thetext original hash from the received new text if the new text isreceived (at step S110).

Next, the mobile incident collection server 500 determines whetherattached file exists or not on the basis of the extracted text originalhash (at step S115), and if the attached file exists, the mobileincident collection server 500 extracts the attached file (at stepS120).

After that, the mobile incident collection server 500 stores and managesthe APP information of the extracted attached file as mobile cyberincident information (at step S125).

On the other hand, the mobile incident collection server 500 extractstext sending information on the basis of the extracted text originalhash (at step S130) and extracts sending number, time, communicationcompany and main phrases from the extracted text sending information tostore and manage the extracted information as the mobile cyber incidentinformation (at steps S135 to S145).

Finally, the mobile incident collection server 500 extracts the textcontent from the extracted text original hash (at step S150), parses theURL of the extracted text content (at step S155), and stores and managesthe parsed information as the mobile cyber incident information (at stepS160).

(Search Portal-based URL Collection Routine)

FIG. 4 is a flow chart showing a search portal-based URL collectionroutine in the method for detecting mobile cyber incidents according tothe present invention.

As shown in FIG. 4, the mobile incident collection server 500 determineswhether a search word collection period starts or not (at step S202),and if the search word collection period starts, the mobile incidentcollection server 500 calls a real-time search word collection API byportal (at step S204).

After the mobile incident collection server 500 calls the search wordcollection API, it calls the number of search words (at step S206).Next, after the mobile incident collection server 500 collects theAPI-based real-time search words by portal (at step S208), it parses thecollected search words (at step S210) and stores and manages the parsedsearch words as the mobile cyber incident information (at step S212).

On the other hand, the mobile incident collection server 500 determineswhether a URL detection period starts or not (at step S216), and if theURL detection period starts, the mobile incident collection server 500calls a search API by portal (at step S218).

Next, the mobile incident collection server 500 calls collected searchwords (at step S220), receives the search results through the collectedsearch words (at step S222), and parses the search results and extractsthe URL information from the parsed search results (at step S224).

The mobile incident collection server 500 determines whether the searchwords not searched exist or not (at step S226), and if the search wordsnot searched exist, it receives the search results corresponding to them(at step S222).

Finally, the mobile incident collection server 500 calls URL repetitioncollection limitation period (at step S228) and determines whether URLsare collected or not (at step S230). If the URLs are collected, themobile incident collection server 500 determines whether the collectedURLs are the repetition collection limitation URLs (at step S232).

After that, if it is determined that the collected URLs are therepetition collection limitation URLs, the mobile incident collectionserver 500 produces and stores URL and hash (at step S234) and storesthe basis information and sets repetition collection limitations (atstep S236).

At this time, the mobile incident collection server 500 analyzes the webpage source of the extracted URL and extracts the URL downloading theapplication connected to the web page. The mobile incident collectionserver 500 checks whether the URL is connected to other web pages, andafter that, it determines whether the URL automatically visits thecorresponding web page to download the applications connected to thecorresponding web page. Accordingly, the mobile incident collectionserver 500 checks whether the collected applications are repeated witheach other to check the relations of the collected applications with theexisting analyzed applications. In this case, the collected applicationsmay be similar to or the same as the existing analyzed applicationsthrough the comparison of application names, versions, uploader names,and URL information therebetween.

As described above, the system and method for detecting mobile cyberincidents according to the present invention collects information on allof paths through which mobile malicious code spreads to detect themobile cyber incidents generated from the mobile malicious code.

Moreover, the system and method for detecting mobile cyber incidentsaccording to the present invention informs applications suspected onmalicious behavior and the information on the applications to a managerand conducts manual analysis only for the suspected applications.

Furthermore, the system and method for detecting mobile cyber incidentsaccording to the present invention provides the stability in applicationanalysis and the sharing system in the detected information, thusdynamically handling the mobile cyber incidents to occur.

While the present invention has been described with reference to theparticular illustrative embodiments, it is not to be restricted by theembodiments but only by the appended claims. It is to be appreciatedthat those skilled in the art can change or modify the embodimentswithout departing from the scope and spirit of the present invention.

What is claimed is:
 1. A system for detecting mobile cyber incidents,the system comprising: a mobile incident collection server adapted tocollect text messages sent through communication company servers toproduce text message detection information, to collect URL informationbased on real-time search words provided by search portals to produceURL detection information, and to collect basic information ofapplication files being sold in application market servers to produceAPK detection information; and a detection information DB adapted toreceive, store and manage the text message detection information, theURL detection information and the APK detection information producedfrom the mobile incident collection server.
 2. The system for detectingmobile cyber incidents according to claim 1, wherein the APK detectioninformation comprises at least one or more of application names,versions, sizes, uploader names, and authorization information.
 3. Thesystem for detecting mobile cyber incidents according to claim 1,wherein when the mobile incident collection server produces the textmessage detection information, the mobile incident collection server isaccessed to the corresponding web pages by using the URL informationcontained in the text messages to check whether applications in the webpages are downloaded.
 4. The system for detecting mobile cyber incidentsaccording to claim 1, wherein when the mobile incident collection servercollects the basic information of the applications being sold in theapplication market servers, the mobile incident collection serveranalyzes the relation between the collected applications and thepreviously analyzed applications to check whether the applications arerepeated.
 5. The system for detecting mobile cyber incidents accordingto claim 4, wherein the mobile incident collection server checks whetherthe collected applications are repeated with the previously analyzedapplications on the basis of at least one or more information of theapplication names, versions, uploader names, and URL information.
 6. Amethod for detecting mobile cyber incidents, the method comprising thesteps of: allowing a mobile incident collection server to determinewhether new text is received; extracting the text original hash from thereceived new text by means of the mobile incident collection server;allowing the mobile incident collection server to determine whetherattached file exists on the basis of the extracted text original hash;if the attached file exists, extracting the attached file by means ofthe mobile incident collection server; and storing and managing the APPinformation of the extracted attached file as mobile cyber incidentinformation in the mobile incident collection server.
 7. The method fordetecting mobile cyber incidents according to claim 6, furthercomprising the steps of: extracting text sending information on thebasis of the extracted text original hash by means of the mobileincident collection server; and extracting sending number, time,communication company and main phrases from the extracted text sendinginformation and storing and managing the extracted information as themobile cyber incident information in the mobile incident collectionserver.
 8. The method for detecting mobile cyber incidents according toclaim 6, further comprising the steps of: extracting the text contentfrom the extracted text original hash by means of the mobile incidentcollection server; parsing the URL of the extracted text content bymeans of the mobile incident collection server; and storing and managingthe parsed information as the mobile cyber incident information in themobile incident collection server.
 9. A method for detecting mobilecyber incidents, the method comprising the steps of: allowing a mobileincident collection server to determine whether a search word collectionperiod starts; if the search word collection period starts, calling areal-time search word collection API by portal by means of the mobileincident collection server; calling the number of search words by meansof the mobile incident collection server; collecting the API-basedreal-time search words by portal by means of the mobile incidentcollection server; parsing the collected search words by means of themobile incident collection server; and storing and managing the parsedsearch words as the mobile cyber incident information in the mobileincident collection server.
 10. A method for detecting mobile cyberincidents, the method comprising the steps of: allowing a mobileincident collection server to determine whether a URL detection periodstarts; if the URL detection period starts, calling a search API byportal by means of the mobile incident collection server; callingcollected search words by means of the mobile incident collectionserver; receiving the search results through the collected search wordsby means of the mobile incident collection server; parsing the searchresults and extracting the URL information from the parsed searchresults by means of the mobile incident collection server; allowing themobile incident collection server to determine whether the search wordsnot searched exist; and if the search words not searched exist,receiving the search results corresponding to the search words notsearched by means of the mobile incident collection server.
 11. Themethod for detecting mobile cyber incidents according to claim 10,further comprising the steps of: after the mobile incident collectionserver parses the search results and extracts the URL information fromthe parsed search results, calling URL repetition collection limitationperiod by means of the mobile incident collection server; allowing themobile incident collection server to determine whether URLs arecollected; if the URLs are collected, allowing the mobile incidentcollection server to determine whether the collected URLs are therepetition collection limitation URLs; if it is determined that thecollected URLs are the repetition collection limitation URLs, producingand storing URL and hash by means of the mobile incident collectionserver; and storing the basis information and setting repetitioncollection limitations by means of the mobile incident collectionserver.
 12. The method for detecting mobile cyber incidents according toclaim 11, further comprising the steps of: analyzing the web page sourceof the extracted URL and extracting the URL downloading the applicationconnected to the corresponding web page by means of the mobile incidentcollection server.
 13. The method for detecting mobile cyber incidentsaccording to claim 12, further comprising the steps of: checking whetherthe URL is connected to other web pages by means of the mobile incidentcollection server; and allowing the mobile incident collection server todetermine whether the URL automatically visits the corresponding webpage to download the applications connected to the web page.
 14. Themethod for detecting mobile cyber incidents according to claim 9,further comprising the step of: allowing the mobile incident collectionserver to check whether the collected applications are repeated witheach other to check the relations of the collected applications with theexisting analyzed applications.
 15. The method for detecting mobilecyber incidents according to claim 14, wherein the relations of thecollected applications with the existing analyzed applications arechecked to check whether at least one or more information of theapplication names, versions, uploader names, and URL information aresimilar to or the same as each other.