期刊文献+

移动僵尸网络综述 被引量:4

Survey of Mobile Botnet
下载PDF
导出
摘要 随着智能终端的普及和4G通信的高速发展,移动僵尸网络的生存环境已经成熟,逐渐威胁到移动互联网的基础设施和移动网民的财产安全。现有的防御措施对这类攻击不再适用,移动僵尸网络已成为移动网络面临的重要安全问题之一。移动僵尸网络的构建依赖于移动恶意软件的传播,因此文章首先介绍了手机恶意软件的发展,随后介绍了移动僵尸网络的演化发展历程。控制与命令信道是僵尸网络研究中攻防双方争夺控制权的关键点,也是僵尸网络构建技术中重要的一环,同样也是区别于恶意软件的重要特征,移动僵尸网络不同于传统的僵尸网络,在控制与命令信道的选择上也略有差异,因此文章对移动僵尸网络的命令与控制信道进行了深入的剖析,重点讨论了短信、蓝牙、HTTP、Web2.0和一些特殊的命令与控制信道国内外研究现状。还进一步探讨了移动僵尸网络不同的传播载体、传播方式和的传播模型的发展,从经典传播模型、围绕蓝牙技术和短信技术的传播模型到更能反映移动僵尸网络特性的时空传播模型,都给出了相应的说明,并介绍了用于研究移动僵尸网络的仿真与模拟工具。最后文章结合实际的情况给出了移动僵尸网络的防御政策,为打击移动网络犯罪提供技术支撑与保障。 ith the popularity of smart devices and the rapid development of 4G technology, the living environment of mobile botnet has been ripe. Mobile botnet has made great damages to infrastructural facilities and property of people. But current security solutions for smart phones and mobile devices are very limited in preventing those attacks. So mobile botnet has become one of the important security problems of the mobile network. Mobile botnet has a close relationship to mobile malware, because construction of mobile botnet dependents on the propagation of mobile malware. This paper first introduces the evolution process of mobile malware. The important part of a botnet construction is the command and control (C&C) channel which is the key point for both the attacker and defender for mobile network control. The mobile botnet is different than the traditional botnet in command and control channel design. Command and control channel is also a mainly sign which is the mobile botnet be distinguish from mobile malware. In order to understand the current research works and the evolution process of mobile botnet, the command and control mechanisms of mobile botnet are discussed. The situation of the command and control based on SMS, Bluetooth, HTTP, Web 2.0 and others researches are analyzed and compared. And the different kinds of propagation of mobile botnet are further more discussed. In this part, to understand the propagation behavior of mobile botnets, many propagation models of mobile botnet as a foundation for further exploration. Those propagation models include deterministic epidemic models, stochastic models and spatialtemporal models. To study the mobile botnet is to connect with the simulator of mobile botnet. Mathematical models simulator, event-based simulator, trace-driven simulator and agent-based simulator of mobile botnet are reviewed. At last, the defense policies of mobile botnet are proposed. The defense policies can help defenders develop defense strategies or make prevention policy to block the propagation of the moblie botnet. And it is important and practical significance for protecting mobile network security and attacking mobile network crime. So the study mobile botnet is very valuable to provide a workable solution to enhance the defense ability of mobile network.
出处 《信息网络安全》 2015年第4期19-27,共9页 Netinfo Security
基金 国家自然科学基金[71173199]
关键词 移动僵尸网络 命令与控制信道 传播模型 仿真工具 mobile botnet command and control channel propagation model simulator
  • 相关文献

参考文献63

  • 1Corporation S. Internet Security Threat Report (ISTR.) [R.]. California:Symantec Corporation, 2014.
  • 2Apvrille A. Symbian worm Yxes: Towards mobile botnets?[J]. Journalin Computer Virology, 2012, 8(4): 117-131.
  • 3Hua J, Sakurai K. A sms-based mobile botnet using flooding algorithm,Information Security Theory and Practice[J].Security and Privacy ofMobile Devices in Wireless Communication: Springer, 2011: 264-279.
  • 4Hamandi K, Elhajj I H, Chehab A, et al. Android SMS botnet: a newperspective[C]// Proceedings of the 10th ACM international symposiumon Mobility management and wireless access, 2012: 125-130.
  • 5Geng G, Xu G, Zhang M, et al. The design of sms based heterogeneousmobile botnet[J].Journal of Computers, 2012, 7(1): 235-243.
  • 6Zeng Y, Shin K G, Hu X. Design of SMS commanded-and-controlled and P2P-structured mobile botnets[C]// Proceedings of thefifth ACM conference on Security and Privacy in Wireless and MobileNetworks, 2012: 137-148.
  • 7Mtibaa A, Harras K A, AJnuweiri H. Malicious attacks in MobileDevice Clouds: A data driven risk assessment[C]/ /ComputerCommunication and Networks (ICCCN), 2014 23rd InternationalConference on, 2014: 1-8.
  • 8Singh K, Sangal S, Jain N, et al. Evaluating bluetooth as a medium forbotnet command and control|J]. Detection of Intrusions and Malware, andVulnerability Assessment: Springer, 2010: 61-80.
  • 9Hua J, Sakurai K. Botnet command and control based on ShoreMessage Service and human mobility [J]. Computer Networks, 2013, 57(2):579-597.
  • 10Jiang R M, Jhang J S, Hsu F H, et al. JokerBot-An Android-BasedBotnet[J].Applied Mechanics and Materials, 2013, (284): 3454-3458.

二级参考文献211

共引文献73

同被引文献45

  • 1李跃,翟立东,王宏霞,时金桥.一种基于社交网络的移动僵尸网络研究[J].计算机研究与发展,2012,49(S2):1-8. 被引量:10
  • 2孙彦东,李东.僵尸网络综述[J].计算机应用,2006,26(7):1628-1630. 被引量:29
  • 3刘冬梅.跟踪僵尸网络[J].信息技术与信息化,2006(6):47-49. 被引量:5
  • 4韩心慧,郭晋鹏,周勇林,诸葛建伟,邹维.僵尸网络活动调查分析[J].通信学报,2007,28(12):167-172. 被引量:14
  • 5LU G, ZHONG H L, ZHANG Y, et al. Automatically Mining Application Signatures for Lightweight Deep Packet Inspection[J]. Network Technology and Application, 2013, 10(6): 86-99.
  • 6LENKA R K, RANJAN P. A Comparative Study on DFA- Based Pattern Matching for Deep Packet Inspection[C]//2012 Third International Conference on Computer and Communication Technology, 2012: 255-260.
  • 7VASHIST A, POYLISHER A, GHOSH A, et al. Managing high volume data for network attack detection using real-time flow filtering[J]. Wireless Communication Over Zigbee for Automotive Inclination Measurement China Communications, 2013, 10(3): 56-66.
  • 8ISO/IEC. Information technology - Open Systems Interconnection- Basic Reference Model: The Basic Model[EB/OL]. http:// www.iso.org/iso/iso catalogue/catalogue tc/catalogue_detail. htm?csnumber=20269.
  • 9SILVA S S C, SILVA R M P, PINTO R C G, et al. Bomets: A survey[J]. Computer Networks, 2013, 57(2): 378-403.
  • 10ZHAO D, TRAORE I, SAYED B, et al. Botnet detection based on traffic behavior analysis and flow intervals[J]. Computers & Security, 2013,39(4): 2-16.

引证文献4

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部