期刊文献+

流量自适应的移动僵尸网络云控机制研究 被引量:1

Research on cloud-based traffic adaptive command and control method for mobile botnet
下载PDF
导出
摘要 僵尸网络从传统恶意代码进化而来,随着智能手机的计算能力与移动互联网接入技术的快速发展,构建移动僵尸网络已成为一种潜在的威胁。针对移动互联网,提出一种具有流量自适应性的移动僵尸网络云控机制,通过分析用户的流量使用情况,在3G和Wi-Fi不同网络环境下采取不同的流量使用策略,使用自适应的调度算法执行僵尸指令。仿真实验证明,在确保僵尸网络命令有效执行的情况下,流量自适应调度算法可有效增强移动僵尸网络的隐蔽性和实时性。 Botnet is a serious attack evolved from traditional malwares. With the rapid development of computing capa- bility and mobile Interact access technology, building a realistic mobile botnet has become a potential threat. An adaptive traffic control mechanism for cloud-based mobile botnet was proposed. It adopts different traffic consumption strategies according to different 3G or Wi-Fi network environments. Then scheduling algorithms to execute botnet commands was applied. The experimental results show the traffic adaptive algorithm can improve the stealthy and efficiency of mobile botnet while ensure that the botnet commands can be executed effectively.
出处 《通信学报》 EI CSCD 北大核心 2014年第11期32-38,共7页 Journal on Communications
基金 国家自然科学基金资助项目(61202353 61272084) 江苏省高校自然科学研究基金资助项目(12KJB520008) 江苏省普通高校研究生科研创新计划基金资助项目(CXLX13_464)~~
关键词 移动僵尸网络 命令与控制 智能手机 调度算法 云控机制 mobile botnet command and control smart phone scheduling algorithm cloud-based control
  • 相关文献

参考文献13

  • 1MULL1NER C, SEIFERTJ P. Rise of the iBots: owning a telco net- work[A]. Proceedings of the 5th IEEE Intemational Conference on Malicious and Unwanted Software (Malware)[C]. Nancy, France, 2010.71-80.
  • 2SCHMIDT A D, SCHMIDT H G, BATYUK L, et al. Smartphone malware evolution revisited: android next target?[A].Proceeding of 4th International Conference on Malicious and Unwanted Software (MALWARE)[C]. Piscataway, N J, USA, 2009. 1-7.
  • 3PORRAS P, SAIDI H, YEGNESWARAN V. An analysis of the iKee B iPhone botnet[A]. Proceedings of the 2nd International ICST Confer- ence on Security and Privacy on Mobile Information and Communica- tions Systems (Mobisec)[C]. Piscataway, N J, USA, 2010. 141 - 152.
  • 4DONG M, ZHONG L. Self-constructive high-rate system energy modeling for battery-powered mobile systems[A]. Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services[C]. New York, N~, USA, 2011.335-348.
  • 5GU G, PERDISCI R, ZHANG J. BotMiner: clustering analysis of network traffic for protocol-and structure-independent botnet detec- tion[A]. Proceedings of USEN1X Security[C]. 2008.139-154.
  • 6MULL1NER C, MILLER C. Fuzzing the phone in your phone[EB/OL]. http://www.blackhat.com/presentations/bh-usa-09/MILLER/BHUSA0 9-Miller-FuzzingPhone-PAPER.
  • 7ZHAO S, LEE P P C, LUI J, et aL Cloud-based push-styled mobile botnets: a case study of exploiting the cloud to device messaging ser- vice[A]. Proceedings of the 28th Annual Computer Security Applica- tions Conference[C]. New York, NY, USA, 2012.119-128.
  • 8CHEN Wei,GONG Peihua,YU Le,YANG Geng.An Adaptive Push-Styled Command and Control Mechanism in Mobile Botnets[J].Wuhan University Journal of Natural Sciences,2013,18(5):427-434. 被引量:6
  • 9GU G, ZHANG J, LEE W. BotSniffer: detecting botnet command and control channels in network traffic[A]. Proceedings of the 15th Annual Network and Distributed System Security Symposium (NDSS'08)[C]. San Diego, CA, 2008.
  • 10CUI X, FANG B, YIN L, et al. Andbot: toward sadvancedmo bilebot- nets[A]. Proceedings of the 4th USENIX Conference on Large-Scale Exploits and Emergent Threats[C]. 2011.11.

二级参考文献21

  • 1Axelle A. Symbian worm yxes towards mobile botnets [EB/OL]. [2011-06-10]. http://www.fortiguard.com/papers/ EICAR2010_Symbian- Yxes_Towards-Mobile-Botnets.pdf.
  • 2Porras P, Sa~di H, Yegneswaran V. An analysis of the ikee. b iphone botnet[J]. Security and Privacy in Mobile Informa- tion andCommunication Systems, 2010, 47(12): 141-152.
  • 3Lookout Inc. Security alert: Geinimi, sophisticated new an- droid trojan found in wild [EB/OL]. [2010-12-29]. http:// blog.mylookout.com/b log/2010/12/29/geinimi_trojan.
  • 4Google Inc. Google cloud messaging for android [EB/OL]. [2012-08-13 ]. http ://developer. android, com/google/gcrrdindex. html.
  • 5Zhao S, Lee P, Lui J, et al.Cloud-based push-styled mobile botnets: A case study of exploiting the cloud to device mes- saging service [C]//Proeeedings of the 28th Annual Com- puter Security Applications Conference (ACSAC), New Or- leans, Louisiana, New York: ACM Press, 2012:119-128.
  • 6Cui X, Fang B X, Yin L H, et al. Andbot: towards advanced mobile bomets [C]//Proeeedings of the 4th USENIX Con- ference on Large-Scale Exploits and Emergent Threats, set. (LEET' 11). Berkeley: USENIX Association, 2011:11-17.
  • 7Traynor P, Lin M, Ongtang M, et al. Oncellular botnets: measuring the impact of malicious devices on a cellular networkcore [C]//Proc of the 16th A CM Conf on Computer and Communications Security. New York: ACM Press, 2009 223-234.
  • 8Singh K, Sangal S, Jain N, et al. Evaluating bluetooth as a medium for botnet command and control [C]//Proc of the Conf on Detection of Intrusions and Malware, and Vulner- ability Assessment. Berlin: Springer-Verlag, 2010: 61-80.
  • 9Zeng Y, Shin K G, Hu X. Design of SMS commanded-and controlled and P2P-structured mobile botnet. Proceedings of the Fifth ACM Conference on Security and Privacy in Wire- less and Mobile Networks, ser. WISEC' 12. New York: ACM Press, 2012: 137-148.
  • 10Geng G, Xu G, Zhang M, et al. An improved SMS based heterogeneous mobile botnet model [C]//In Proceedings of 1EEE International Conference on Information and Automa- tion (ICIA). New York: IEEE Press, 2011: 198-202.

共引文献5

同被引文献3

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部