期刊文献+

综合短信和HTTP协议C&C信道的移动僵尸网络设计 被引量:5

Design of Mobile Botnets Integrated SMS and HTTP Protocol C&C Channel
下载PDF
导出
摘要 移动僵尸网络进行恶意扣费、泄露隐私信息等恶意行为,给移动用户构成了巨大隐患.通过构建实用的移动僵尸网络,可以更好地了解其工作机制,从而提出直接有效的防御策略.提出结合短信(SMS)和HTTP协议作为移动僵尸网络的命令与控制(Command and Control,C&C)的通信信道的设计方法,设计了一种移动僵尸程序HybirdBot.在减少消耗的同时确保命令信息能准确接收和高效执行,又能将僵尸网络流量隐藏在其他良性的HTTP流量中.实验结果表明,HybirdBot命令执行时间基本控制在1s以内,运行时CPU占用率只达1-2%,平均每条命令所产的流量也只有0.62kb.证明该移动僵尸网络具有高效性,隐匿性好而且消耗少,最后本文还提出了几种防御策略. Mobile botnets performing malicious behavior such as malicious chargeback,disclosure of private information, constitutes a huge risk for mobile users. By constructing practical mobile botnets, we can better understand the mechanism of its working, and to make a direct and effective defense strategy. In this paper, we propose a design of integrated SMS and HTrP Protocol as command and control communication channel of the mobile botnets, and design a mobile botuet called HybirdBot. Ensure the command information accurate receiving and efficient execution while reduce consumption, and botnet traffic can be well hidden in other benign http traffic. The experimental results show that the execution time of HybirdBot basic controls in less than 1 second, and the CPU utiliza- tion rate of bot only 1% to 2%, and with an average traffic produced by each command only 0.62kb. The evaluation results prove that the mobile botnets with high efficiency, good stealthiness and less consuming. To conclude our paper, we suggest several defense strategies.
出处 《小型微型计算机系统》 CSCD 北大核心 2014年第7期1458-1463,共6页 Journal of Chinese Computer Systems
基金 国家重点基础研究发展计划项目(2012CB315805)资助 国家自然科学基金项目(61173167)资助
关键词 移动僵尸网络 短信 HTTP 命令与控制通信信道 Mobile botnet SMS HTTP command and control communicate channel (C&C)
  • 相关文献

参考文献18

  • 1Apvrille A. Symbian worm yxes: towards mobile botnets? [ J ]. Journal in Computer Virology, 2012,8 ( 4 ) : 117 -131.
  • 2Porras P, Saidi H, Yegneswaran V. An analysis of the ikee [ C ]. Bi- phone Botnet, Security and Privacy in Mobile Information and Communication Systems,2010 : 141-152.
  • 3Lookout Inc. Security alert: Geinimi, sophisticated newandroid tro- jan found in wild [ EB/OL]. http://blog2010. mylookout. com/blog/2010/12/29/geinimi_trojan, 2010.
  • 4Trend Micro Inc. Zeus targets mobile users[ EB/OL]. http://blog. trendmicro. com/zeus-targets-mobile-users ,2011.
  • 5Jiang X. Security alert: AnserverBot, new sophisticated android bot found in alternative android markets[ EB/OL]. http://www. csc. ncsu. edu/faculty/jiang/AnserverBot/,2011.
  • 6Kaspersky Inc. Ire bot for android [ EB/OL ]. http://www. secureli st. com/en/blog/208193332/IRC_bot_for_Android,2012.
  • 7Traynor P, Lin M, Ongtang M,et al. On cellular botnets: measuring the impact of malicious devices on a cellular network core[ C]. In: Proceedings of thel2rd ACM Conference on Computer and Com- munications Security, Chicago, USA: Association for Computing Machinery ,2009:223- 234.
  • 8Singh K, Sangal S, Jain N, et al. Evaluating bluetooth as a medium- for botnet command and control[ C ]. In:Proceedings of the Interna- tional Conference on Detection of Intrusions and Malware, and Vul- nerability Assessment (DIMVA) , Bonn, Germany: Association for Computing Machinery ,2010:61- 80.
  • 9Zeng Yuan-yuan, Kang G Shin, Xin Hu. Design of SMS comman- ded-and-controlled and P2P-structured mobile hornet [ C ]. In:Pro- ceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks,New York,2012:137-148.
  • 10Matthew Knysz, Xin Hu, Zeng Yuan-yuan, et al. Open WiFi net- works:lethal weapons for botnets? [ C]. In: Proceedings of the 31 st Annual IEEE International Conference on Computer Commu- nications( IEEE INFOCOM) ,2012:2631-2635.

同被引文献115

  • 1李跃,翟立东,王宏霞,时金桥.一种基于社交网络的移动僵尸网络研究[J].计算机研究与发展,2012,49(S2):1-8. 被引量:10
  • 2北京网秦天下科技有限公司.2010 年中国大陆地区手机安全报告[EB/OL].http://www.netqin.com/market/2010 report/,2010-02-24.
  • 3刘湛.J2EE全面简介[EB/OL].http://www 900.ibm.com/developerWorks/cn/java/j2 ee/index. shtml,2001-07.
  • 4北京网秦天下科技有限公司.2011年中国大陆地区手机安全报告[EB/OL].http://www.netqincom/upLoad/File/baogao/2011anquanbaodao(1)pdc2012-03-20.
  • 5Zeng Yuan-yuan, Hu Xin, Shin K G. Design of SMS Commanded and Controlled and P2P-Structured Mobile Botnets[EB/OL]. https:// www.eecs.umich.edu/techreports/cse/2010/CSE-TR-562-10.pdf.
  • 6Corporation S. Internet Security Threat Report (ISTR.) [R.]. California:Symantec Corporation, 2014.
  • 7Apvrille A. Symbian worm Yxes: Towards mobile botnets?[J]. Journalin Computer Virology, 2012, 8(4): 117-131.
  • 8Hua J, Sakurai K. A sms-based mobile botnet using flooding algorithm,Information Security Theory and Practice[J].Security and Privacy ofMobile Devices in Wireless Communication: Springer, 2011: 264-279.
  • 9Hamandi K, Elhajj I H, Chehab A, et al. Android SMS botnet: a newperspective[C]// Proceedings of the 10th ACM international symposiumon Mobility management and wireless access, 2012: 125-130.
  • 10Geng G, Xu G, Zhang M, et al. The design of sms based heterogeneousmobile botnet[J].Journal of Computers, 2012, 7(1): 235-243.

引证文献5

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部