期刊文献+

一种基于SMS的移动僵尸网络的设计及分析

Design and Analysis of a SMS-based Mobile Botnet
下载PDF
导出
摘要 僵尸网络是计算机重要的安全威胁。随着智能手机的发展,这一安全威胁出现在智能手机上。现在手机中毒已成为普遍现象,在研究了手机传播病毒方式的基础上,对移动僵尸网络的传播、命令控制机制以及控制协议进行了深入研究,分别分析了结构化和非结构化的拓扑结构,用示例来描述如何将SMS信息的C&C通道与P2P的拓扑结构相结合,对基于SMS的移动僵尸网络进行设计和分析。对于移动僵尸网络这种新型的手机病毒攻击模式将会严重影响人们的生活,因此必须不断地研究、发现各种威胁手机的行为。 Botnet is an important threat on computer security. As the development of smart phones,the security threats appeared on the smart phones. Nowmobile phone infected virus has become a common phenomenon. Based on the research of mobile phone virus spreading on the way,the spread,command and control mechanisms,and control protocol of mobile botnet are studied in- depth,respectively analyzing the topology of structured and unstructured. Use example to describe howto combine SM S CC and P2 P structure. Based on the SM S mobile botnet,carry on the design and analysis. For mobile botnet,a newtype of virus attack mode for mobile phone,will seriously affect people's life,so the continuous study is done and the behavior of the various threats to mobile phones is found.
作者 徐建
出处 《计算机技术与发展》 2016年第1期106-110,123,共6页 Computer Technology and Development
基金 国家自然科学基金资助项目(61202353) 江苏省高校自然科学研究资助项目(12KJB520008) 南京邮电大学实验室工作研究课题(2015XSG05)
关键词 移动僵尸网络 命令控制 P2P 拓扑结构 mobile botnet C&C P2P topology
  • 相关文献

参考文献15

  • 1王海龙,唐勇,龚正虎.僵尸网络命令与控制信道的特征提取模型研究[J].计算机工程与科学,2013,35(2):62-67. 被引量:9
  • 2Google yanks over 50 infected apps from android market[ EB! OL]. 2011-03-02. http ://www. computerworld, corn/article/ 2506378/securityO/google-yanks - over- 50 - infected - apps - from-android-market, html.
  • 3Geer D. Malicious bots threaten network security [ J ]. Comput- er,2005,38 ( 1 ) : 18-20.
  • 4方滨兴,崔翔,王威.僵尸网络综述[J].计算机研究与发展,2011,48(8):1315-1331. 被引量:63
  • 5Song Lipeng, Jin Zhen, Sun Guiquan. Modeling and analyzing of botnet interactions [ J ]. Physica A, 2011,390 ( 2 ) : 347 - 358.
  • 6Song Lipeng, Jin Zhen, Sun Guiquan. Influence of removable devices on computer worms: dynamic analysis and control strategies[J]. Computers and Mathematics with Applications, 2011,61 (7) :1823-1829.
  • 7Feily M, Shahrestani A, Ramadass S. A survey of botnet and botnet detection [ C ]//Proceedings of the 3rd international conference on digital object identifier. Athens/Glyfada, Greece : IEEE ,2009:268-273. 31st annual.
  • 8Hua Jingyu, Sakurai K. A SMS-based mobile botnet using flooding algorithm[ C ]//Proc of the 5th workshop in informa- tion security and privacy. Berlin : Springer,2011:264-279.
  • 9Singh K,Sangal S,Jain N,et al. Evaluating bluetooth as a me- dium for botnet command and control[ C]//Proc of the 7th international conf on detection of intrusions and malware, and vulnerability assessment. Berlin: Springer,20 l0 : 61 - 80.
  • 10Knysz M, Hu Xin, Zeng Yuanyuan, et al. Open WiFi networks : lethal weapons for botnets? [ C ]//Proc of the IEEE international conference on computer communications. [ s. 1. ] :IEEE ,2012:2631-2635.

二级参考文献68

  • 1文伟平,卿斯汉,蒋建春,王业君.网络蠕虫研究与进展[J].软件学报,2004,15(8):1208-1219. 被引量:187
  • 2孙彦东,李东.僵尸网络综述[J].计算机应用,2006,26(7):1628-1630. 被引量:29
  • 3唐勇,卢锡城,胡华平,朱培栋.基于多序列联配的攻击特征自动提取技术研究[J].计算机学报,2006,29(9):1533-1541. 被引量:25
  • 4Porras P, Saidi H, Yegneswaran V. A foray into Conficker's logic and rendezvous points [R/OL]. Berkeley, CA: USENIX, 2009. [2011-06-10]. http://www, usenix, org/ events/leet09/tech/full papers/porras/porras_html/.
  • 5CNCERT.中国互联网网络安全报告[EB/OL].2011.[201-06-10].http://www.cert.org.cn/UserFiles/File/2010%20first%20half.pdf.2010.
  • 6Symantec Inc. Symantec global Internet security threat report trends for 2009 volume XV [EB/OL]. 2010. E2011 06-101. http://eval, symantee, com/mktginfo/enterprise/white_ papers/b-whitepaper_internet security threat report xv 04 2010. en-us, pdf.
  • 7Holz T, Gorecki C, Rieck C, et al. Detection and mitigation of fast-flux service networks [C] //Proc of the 15th Annual Network and Distributed System Security Symposium. Berkeley, CA: USENIX, 2008.
  • 8Stone-Gross B, Cova M, Cavallaro L, et al. Your botnet is my botnet: Analysis of a botnet takeover[C] //Proc of the 16th ACM Conf on Computer and Communications Security. New York: ACM, 2009:635-647.
  • 9Cui Xiang, Fang Towards advanced Usenix Workshop Threats. Berkeley, Binxing, Yin Lihua, et al. Andbot: mobile bomets [C] //Proc of the 4th on Large-scale Exploits and Emergent CA: USENIX, 2011:No 11.
  • 10Wang P, Sparks S, Zou C C. An advanced hybrid peer-topeer botnet [C] //Proc of the 1st Conf on 1st Workshop on Hot Topics in Understanding Botnets. Berkeley, CA: USENIX, 2007: No 2.

共引文献203

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部