期刊文献+

移动僵尸网络评估的性能指标研究

Research on assessment indexes of mobile botnets
下载PDF
导出
摘要 为了全面、客观和系统地反映移动僵尸网络运行情况和攻击危害,针对移动僵尸网络评估的性能指标进行了研究。首先,将移动僵尸网络的性能指标进行分类和提取,并给出了数学计算式进行表述;提出了正性指标、负性指标和中性指标的概念,从而更有效地反映性能指标的属性;使用层次分析法对每个性能指标的权值进行了计算,并得出了计算结果。运用该评估性能指标对四个具有典型特点的移动网络进行了评估,验证了该方法的可行性和有效性。结果表明这种评估方法能够对移动僵尸网络的危害性进行综合评估,给防御策略提供了依据。 In order to reflect the hazard and character of mobile botnets,this paper reserached the assessment indexes of mobile botnets. Firstly,this paper classified the assessment indexes of mobile botnets and gave many formulas which quantified each indexes. It also proposed positive indexes,negative indexes and neutral indexes to characterize the assessment indexes. Finally,applied AHP( analytics hierarchy process) method to calculate the weight of the indexes. It formed an integrated set of assessment indexes,and assessmented four different mobile botnets by using the assessment indexes to verify their feasibility.The results show that this method can comprehensively evalute the mobile botnets threat ability,and give a basis for defense strategy.
出处 《计算机应用研究》 CSCD 北大核心 2016年第3期821-826,共6页 Application Research of Computers
基金 国家自然科学基金资助项目(71173199) 中央高校基本科研业务费资助项目(2014JKF01144)
关键词 移动僵尸网络 评估模型 性能指标 mobile botnets assessment model assessment indexes
  • 相关文献

参考文献13

  • 1Singh K, Sangal S, Jain N, et al. Evaluating bluetooth as a medium for botnet command and control[M] . Detection of Intrusions and Malware, and Vulnerability Assessment:Springer, 2010:61-80.
  • 2Lu Zhou, Wang Wenye, Wang C. How can botnets cause storms? Understanding the evolution and impact of mobile botnets[C] //Proc of INFOCOM. [S. l.] :IEEE Press, 2014:1501-1509.
  • 3Liao Qi, Li Zhen. Portfolio optimization of computer and mobile botnets[J] . International Journal of Information Security, 2014, 13(1):1-14.
  • 4Hua Jingyu, Sakurai K. A SMS-based mobile botnet using flooding algorithm[C] //Proc of the 5th IFIP WG 11. 2 International Workshop on Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication. Berlin:Springer, 2011:264-279.
  • 5Pieterse H, Olvier M. Design of a hybrid command and control mobile botnet[C] //Proc of ICIW. 2013.
  • 6Geng Guining, Xu Guoai, Zhang Miao, et al. The design of SMS-based heterogeneous mobile botnet[J] . Journal of Computers, 2012, 7(1):235-243.
  • 7Zhao Shuang, Lee P P, Lui J C S, et al. Cloud-based push-styled mobile botnets:a case study of exploiting the cloud to device messaging service[C] //Proc of the 28th Annual Computer Security Applications Conference. New York:ACM Press, 2012:119-128.
  • 8Cui Xiang, Fang Bingxing, Yin Lihua, et al. Andbot:towards advanced mobile botnets[C] //Proc of the 4th USENIX Conference on Large-scale Exploits and Emergent Threats. 2011:11.
  • 9Wang Shuai, Cui Xing, Liao Peng, et al. S-URL flux:a novel C&C protocol for mobile botnets[M] //Trustworthy Computing and Services. Berlin:Springer, 2013:412-419.
  • 10Marupally P R, Paruchuri V. Comparative analysis and evaluation of botnet command and control models[C] //Proc of the 24th IEEE International Conference on Advanced Information Networking and Applications. [S. l.] :IEEE Press, 2010:82-89.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部