期刊文献+

手机僵尸网络研究

RESEARCH ON MOBILE BOTNETS
下载PDF
导出
摘要 手机僵尸网络是桌面系统僵尸网络在手机领域的延伸和发展,同属于广义僵尸网络的一个子集.随着智能手机的日渐普及和3G网络的成熟,基于手机构建的僵尸网络正从萌芽期进入到快速发展阶段,对手机用户的财产和隐私安全带来前所未有的威胁.我们在分析手机僵尸网络的特征和发展现状的基础上分析其使用的关键技术.最后我们对手机僵尸网络的发展方向进行了预测. Mobile Botnet is the extension and development of desktop botnet and they are both the subsets of generalized botnet. With the popularity of smartphone and the improvement of 3G network, smartphone- based botnet is stepping into a new stage of rapid development after technology trigger, resulting in unprecedented threat to the mobile user~ property and privacy security. Basing on analyzing the characteristic and development of mobile botnet, we introduce the latest techniques of mobile botnet in detail on its analyses. At the end we analyze the trends of mobile botnet.
出处 《山东师范大学学报(自然科学版)》 CAS 2012年第4期38-41,共4页 Journal of Shandong Normal University(Natural Science)
基金 山东省自然科学基金资助项目(ZR2011FM023) 国际自然科学基金资助项目(61070613)
关键词 僵尸网络 手机安全 恶意代码 僵尸程序 botnet mobile security malware bot
  • 相关文献

参考文献10

  • 1Denis Maslennikov. Mobile Malware Evolution: An Overview, Part 4[R]. Securelist, 2011.
  • 2Axelle Apvrille, Symbian worm Yxes: Towards mobile botnets? [J]. Computer Virlolgy. 2012, 53 (5) :233 -257.
  • 3诸葛建伟,韩心慧,叶志远,等.僵尸网络的发现与跟踪[C].全国网络与信息安全技术研讨会,2005.
  • 4北京网秦天下科技有限公司.2011年中国大陆地区手机安全报告[R],2011.
  • 5方滨兴,崔翔,王威.僵尸网络综述[J].计算机研究与发展,2011,48(8):1315-1331. 被引量:63
  • 6Phillip Porras, Hassen Saidi, Vinod Yegneswaran. An Analysis of the iKee. B iPhone Botnet[J]. Security and Privacy in Mobile Information and Communication Systems, 2010, 47(5): 141 - 152.
  • 7Tim Wyatt. Security Alert: Geinimi, Sophisticated New Android Trojan Found in Wild[R]. The Lookout Blog, 2010.
  • 8Xuxian Jiang, Security Alert: AnserverBot, New Sophisticated Android Bot Found in Alternative Android Market [ R ]. 2011.
  • 9Xuxian Jiang. Security Alert: New TigerBot Malware Found in Alternative Android Markets[ R]. 2012.
  • 10网秦安全播报.吸费软件伪装“安卓升级补丁”群发短信强扣手机话费[R].2012.

二级参考文献62

  • 1Porras P, Saidi H, Yegneswaran V. A foray into Conficker's logic and rendezvous points [R/OL]. Berkeley, CA: USENIX, 2009. [2011-06-10]. http://www, usenix, org/ events/leet09/tech/full papers/porras/porras_html/.
  • 2CNCERT.中国互联网网络安全报告[EB/OL].2011.[201-06-10].http://www.cert.org.cn/UserFiles/File/2010%20first%20half.pdf.2010.
  • 3Symantec Inc. Symantec global Internet security threat report trends for 2009 volume XV [EB/OL]. 2010. E2011 06-101. http://eval, symantee, com/mktginfo/enterprise/white_ papers/b-whitepaper_internet security threat report xv 04 2010. en-us, pdf.
  • 4Holz T, Gorecki C, Rieck C, et al. Detection and mitigation of fast-flux service networks [C] //Proc of the 15th Annual Network and Distributed System Security Symposium. Berkeley, CA: USENIX, 2008.
  • 5Stone-Gross B, Cova M, Cavallaro L, et al. Your botnet is my botnet: Analysis of a botnet takeover[C] //Proc of the 16th ACM Conf on Computer and Communications Security. New York: ACM, 2009:635-647.
  • 6Cui Xiang, Fang Towards advanced Usenix Workshop Threats. Berkeley, Binxing, Yin Lihua, et al. Andbot: mobile bomets [C] //Proc of the 4th on Large-scale Exploits and Emergent CA: USENIX, 2011:No 11.
  • 7Wang P, Sparks S, Zou C C. An advanced hybrid peer-topeer botnet [C] //Proc of the 1st Conf on 1st Workshop on Hot Topics in Understanding Botnets. Berkeley, CA: USENIX, 2007: No 2.
  • 8Holz T, Steiner M, Dahl F, et al. Measurements an mitigation of peer-to peer-based botnets:A case study o storm worm [C] //Proc of the 1st USENIX Workshop o Large-scale Exploits and Emergent Threats. Berkeley, CA USENIX, 2008: No 9.
  • 9Kanich C, Levchenko K, Enright B, et al. The Heisenbot uncertainty problem: Challenges in separating bots from chaff [C] //Proc of the 1st USENIX Workshop on Large- Scale Exploits and Emergent Threats. Berkeley, CA: USENIX, 2008:1-9.
  • 10Ramaehandran A, Feamster N. Understanding the networklevel behavior of spammers[C] //Proe of the 2006 Conf on Applications, Technologies, Architectures and Protocols for Computer Communications. New York: ACM, 2006: 291- 302.

共引文献65

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部