期刊文献+

一种基于Android系统的手机僵尸网络 被引量:7

Mobile Botnet Based on Android System
下载PDF
导出
摘要 提出一种基于Android系统的手机僵尸网络,设计命令控制信道及手机状态回收方式。分析僵尸手机的恶意行为,给出手机僵尸网络防劫持策略,包括多服务器策略、域名flux技术与身份认证系统,通过RSS及GZIP压缩技术降低僵尸程序消耗的网络流量。对手机僵尸网络的发展趋势及防御手段进行了讨论。 This paper proposes a kind of mobile botnet based on Android system,including the design of command and control channel,the way that botmaster recycles the information of controlled phones.It analyzes the malicious act of the bot phones,gives the defense of hijack,including the multiserver strategy,the domain-flux technology,and the identity authentication system.It reduces the flow rate of bot program by RSS and GZIP technology.The future and the defense of mobile botnet are discussed.
出处 《计算机工程》 CAS CSCD 北大核心 2011年第22期1-4,共4页 Computer Engineering
基金 国家"863"计划基金资助项目(2007AA010501)
关键词 手机僵尸网络 ANDROID系统 命令控制信道 恶意行为 防劫持 流量控制 mobile botnet Android system command and control channels malicious act defense of hijack flow control
  • 相关文献

参考文献13

  • 1杜跃进,崔翔.僵尸网络及其启发[J].中国数据通信,2005,7(5):9-13. 被引量:14
  • 2Freiling F,Holz T,Wicherski G.Botnet Tracking: Exploring a Root-cause Methodology to Prevent Distributed Denial-of-service Attacks[C]//Proc.of the 10th European Symposium on Research in Computer Security.Berlin,Germany: Springer,2005.
  • 3Dagon D,Zou C,Lee W.Modeling Botnet Propagation Using Time Zones[C]//Proc.of NDSS’06.Berkeley,USA:[s.n.],2006.
  • 4Ramachandran A,Feamster N,Dagon D.Revealing Botnet Mem- bership Using DNSBL Counter-intelligence[C]//Proc.of the 2nd Conference on Steps to Reducing Unwanted Traffic on the Internet.Berkeley,USA:[s.n.],2006.
  • 5Porras P A,Saidi H,Yegneswaran V.An Analysis of the Ikee.B (Duh) iPhone[C]//Proc.of ICST’10.Berlin,Germany: Springer,2010.
  • 6Schmidt A D,Schmidt H G,Batyuk L,et al.Smartphone Malware Evolution Revisited: Android Next Target?[C]//Proc.of the 4th IEEE International Conference on Malicious and Unwanted Software.[S.l.]: IEEE Computer Society,2009.
  • 7Wang P,Sparks S,Zou C C.An Advanced Hybrid Peer-to-Peer Botnet[C]//Proc.of the 1st Conference on First Workshop on Hot Topics in Understanding Botnets.Berkeley,USA:[s.n.],2007.
  • 8谢静,谭良.一种高鲁棒性的新型P2P僵尸网络[J].计算机工程,2011,37(7):154-156. 被引量:3
  • 9Zeng Yuanyuan,Hu Xin,Shin K G.Design of SMS Commanded and Controlled and P2P-structured Mobile Botnets[EB/OL].[2011-03-20].https://www.eecs.umich.edu/techreports/cse/2010/ CSE-TR-562-10.pdf.
  • 10Singh K,Sangal S,Jain N,et al.Evaluating Bluetooth as a Me- dium for Botnet Command and Control[C]//Proc.of DIMVA’10.Berlin,Germany: Springer,2010.

二级参考文献15

  • 1Wang Ping.Sparks S,Zou C C.An Advanced Hybrid Peer-to-Peer Bomet[C]//Proc.of HotBots'07.Cambridge,Massachusetts,USA:[s.n.],2007.
  • 2Dagon D,Gu G,Zou C,et al.A Taxonomy of Botners.Unpublished(Unpublished Paper)[EB/OL].(2005-05-12).http://www.math.tulane.edu/tcsem/botnets/ndss_botax.pdf.
  • 3Zou C C,Cunningham R.Honeypot-aware Advanced Botnet Construction and Maintenance[C]//Proc.of International Conference on Dependablc Systems and Networks.Estoril,Lisbon,Portugal:[s.n.],2006.
  • 4国家计算机网络应急技术协调中心.CNCERT/CC 2008年上半年网络安全:亡作报告[Z].2009.
  • 5http://2005.cert.org.cn/index.html
  • 6CNCERT/CC. 今年上半年我国互联网安全事件分析. http://www.cert.org.cn/articles/statistic/common/2003092321145.shtml, 2003年9月
  • 7F-Secure Virus Descriptions : Deloder. http://www.f-secure.com/v-descs/deloader.shtml, 2003
  • 8Stone V. W32 Deloder Worm: the building of an army. http://www.giac.org/certified_professionals/practicals/gcih/0454.php , 2003
  • 9Puri R, Bots & BotNet: an overview, www.sans.org/rr/whitepapers/malicious/1299.php , 2003, 8
  • 10Vogt T. Simulating and optimising worm propagation algorithms. www.securityfocus.com/guest/24046, 2003, 9

共引文献18

同被引文献51

  • 1李跃,翟立东,王宏霞,时金桥.一种基于社交网络的移动僵尸网络研究[J].计算机研究与发展,2012,49(S2):1-8. 被引量:10
  • 2杨欢,张玉清,胡予濮,刘奇旭.基于权限频繁模式挖掘算法的Android恶意应用检测方法[J].通信学报,2013,34(S1):106-115. 被引量:47
  • 3北京网秦天下科技有限公司.2010 年中国大陆地区手机安全报告[EB/OL].http://www.netqin.com/market/2010 report/,2010-02-24.
  • 4Porras P A, Saidi H, Yegneswaran V. An Analysis of the Ikee. B(Duh) iPhone[C]. Proc. of ICST' 10. Berlin, Germany:Springer, 2010.
  • 5中国计算机报.“手机僵尸病毒”成为移动互联网巨大隐患[EB/OL].http://tech.ifeng.corrdintemet/detail_2010_l1/23/3201580_0.shtml.
  • 6Patrick Traynor, Michael Lin, et al.On Cellular Botnets:Mea- suring the Impact of Malicious Devices on a Cellularnetwork Core[R]. ACM Conference on Computer and Communications Security(CCS) , 2009.11.http://www.patrickmcdaniel.org/ pubs/ccs09b.pdf.
  • 7Zeng Yuanyuan, Hu Xin, Shin K G. Design of SMS Com- mandedand Controlled and P2P-Structured Mobile Botnets [EB/OL]. https://www.eecs.umich.edu/techreports/cse/2010/ CSE-TR-562-10.pdf.
  • 8Collin Mulliner. Jean-Pierre Seifet. Rise of the iBots:Owning a Telco Network[J]. 5th IEEE International Conference on Malicious and Unwanted Software(MALWARE), Nancy, Fran- ce,2010.10.
  • 9北京网秦天下科技有限公司.2011年中国大陆地区手机安全报告[EB/OL].http://www.netqincom/upLoad/File/baogao/2011anquanbaodao(1)pdc2012-03-20.
  • 10菩提老王.ArcGIS移动客户端离线地图的集中解决方[EB/OL].http://blog.newnaw.com/?p=7362011-03-29.

引证文献7

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部