期刊文献+

一种基于社交网络的移动僵尸网络研究 被引量:10

Mobile Botnet Based on SNS
下载PDF
导出
摘要 随着移动互联网的快速发展,僵尸网络正在从传统互联网络向移动网络过渡,移动僵尸网络已成为未来移动互联网安全急需关注的热点方向.而社交网络业务在移动互联网上的广泛应用以及实时异步松耦合的通信特点,为移动僵尸网络提供了控制能力更强、隐蔽性更好的控制信息平台载体.提出了一种基于社交网络控制的移动僵尸网络,僵尸控制者(Botmaster)通过公共社交网络服务器控制整个僵尸网络;在服务器的逻辑层,僵尸网络呈现多账号的P2P结构,同时僵尸网络的拓扑结构可由Botmaster自主定义,在此基础上,根据实际应用场景提出两种通用网络拓扑生成算法,通过仿真分析,证明了基于社交网络控制的移动僵尸网络具有良好的隐蔽性、健壮性和灵活性. 随着移动互联网的快速发展,僵尸网络正在从传统互联网络向移动网络过渡,移动僵尸网络已成为未来移动互联网安全急需关注的热点方向.而社交网络业务在移动互联网上的广泛应用以及实时异步松耦合的通信特点,为移动僵尸网络提供了控制能力更强、隐蔽性更好的控制信息平台载体.提出了一种基于社交网络控制的移动僵尸网络,僵尸控制者(Botmaster)通过公共社交网络服务器控制整个僵尸网络;在服务器的逻辑层,僵尸网络呈现多账号的P2P结构,同时僵尸网络的拓扑结构可由Botmaster自主定义,在此基础上,根据实际应用场景提出两种通用网络拓扑生成算法,通过仿真分析,证明了基于社交网络控制的移动僵尸网络具有良好的隐蔽性、健壮性和灵活性.
出处 《计算机研究与发展》 EI CSCD 北大核心 2012年第S2期1-8,共8页 Journal of Computer Research and Development
基金 国家"八六三"高技术研究发展计划重大基金项目(2011AA010701 2011AA01A103) 中科院战略性先导科技专项课题(XDA06030200) 国家自然科学基金项目(6100174) 国家科技支撑计划(2012bah37B04)
关键词 移动僵尸网络 社交网络服务 TWITTER 移动互联网 网络安全 mobile botnet SNS(Social Network Service) Twitter mobile internet network security
  • 相关文献

参考文献10

  • 1方滨兴,崔翔,王威.僵尸网络综述[J].计算机研究与发展,2011,48(8):1315-1331. 被引量:63
  • 2D.Geer.Malicious Bots Threaten Network Security. Computer . 2005
  • 3SONG Lipeng,JIN Zhen,SUN Guiquan.Influence ofremovable devices on computer worms:Dynamic analysis andcontrol strategies. Computers and Mathematics withApplications . 2011
  • 4Feily M,Shahrestani A,Ramadass S.A survey of botnet andbotnet detection. Proceedings of the 3rd InternationalConference on Digital Object Identifier . 2009
  • 5Stone-Gross B,Cova M,Cavallaro L,et al.Your botnet is my botnet:Analysis of a botnettakeover. Proc of the16th ACM conf on Computer and Communications Security . 2009
  • 6Cui Xiang,Fang Binxing,Yin Lihua,et al.Andbot:Towards advanced mobile botnets. Proc ofthe4thUsenix Workshop on Large-scale Exploits and Emergent Threats . 2011
  • 7Hua J,Sakurai K.A SMS-based mobile Botnet using flooding algorithm. Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication . 2011
  • 8Holz T,Gorecki C,Rieck K,et al.Measuring and detecting fast-flux service networks. Proc of the16th Annual Network and Distributed System Security Symp(NDSS08) . 2008
  • 9Wang P,Sparks S,Zou C C.An advanced hybrid peer-to-peer botnet. Proc of the 1st Conf on Workshop on Hot Topics in Understanding Botnets . 2007
  • 10Geng Guining,Xu Guoai,Zhang Miao,et al.An improved SMS based heterogeneous mobile botnet model. Proc of the IEEE Int Conf on Information and Automation . 2011

二级参考文献62

  • 1Porras P, Saidi H, Yegneswaran V. A foray into Conficker's logic and rendezvous points [R/OL]. Berkeley, CA: USENIX, 2009. [2011-06-10]. http://www, usenix, org/ events/leet09/tech/full papers/porras/porras_html/.
  • 2CNCERT.中国互联网网络安全报告[EB/OL].2011.[201-06-10].http://www.cert.org.cn/UserFiles/File/2010%20first%20half.pdf.2010.
  • 3Symantec Inc. Symantec global Internet security threat report trends for 2009 volume XV [EB/OL]. 2010. E2011 06-101. http://eval, symantee, com/mktginfo/enterprise/white_ papers/b-whitepaper_internet security threat report xv 04 2010. en-us, pdf.
  • 4Holz T, Gorecki C, Rieck C, et al. Detection and mitigation of fast-flux service networks [C] //Proc of the 15th Annual Network and Distributed System Security Symposium. Berkeley, CA: USENIX, 2008.
  • 5Stone-Gross B, Cova M, Cavallaro L, et al. Your botnet is my botnet: Analysis of a botnet takeover[C] //Proc of the 16th ACM Conf on Computer and Communications Security. New York: ACM, 2009:635-647.
  • 6Cui Xiang, Fang Towards advanced Usenix Workshop Threats. Berkeley, Binxing, Yin Lihua, et al. Andbot: mobile bomets [C] //Proc of the 4th on Large-scale Exploits and Emergent CA: USENIX, 2011:No 11.
  • 7Wang P, Sparks S, Zou C C. An advanced hybrid peer-topeer botnet [C] //Proc of the 1st Conf on 1st Workshop on Hot Topics in Understanding Botnets. Berkeley, CA: USENIX, 2007: No 2.
  • 8Holz T, Steiner M, Dahl F, et al. Measurements an mitigation of peer-to peer-based botnets:A case study o storm worm [C] //Proc of the 1st USENIX Workshop o Large-scale Exploits and Emergent Threats. Berkeley, CA USENIX, 2008: No 9.
  • 9Kanich C, Levchenko K, Enright B, et al. The Heisenbot uncertainty problem: Challenges in separating bots from chaff [C] //Proc of the 1st USENIX Workshop on Large- Scale Exploits and Emergent Threats. Berkeley, CA: USENIX, 2008:1-9.
  • 10Ramaehandran A, Feamster N. Understanding the networklevel behavior of spammers[C] //Proe of the 2006 Conf on Applications, Technologies, Architectures and Protocols for Computer Communications. New York: ACM, 2006: 291- 302.

共引文献62

同被引文献212

引证文献10

二级引证文献94

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部