期刊文献+

基于Android的僵尸网络设计与实现 被引量:1

Design and Implementation of Mobile Botnet Based on Android System
下载PDF
导出
摘要 针对移动智能终端因发起攻击而导致大量个人隐私数据泄露的问题,以互联网僵尸网络技术为基础,面向Android平台设计并实现了移动僵尸网络。该移动僵尸网络基于微博控制,对移动智能终端可完成信息窃取、信息破坏、垃圾短信等攻击。同时,对移动僵尸网络的特性进行深入分析,寻找攻击漏洞,给出具有针对性的网络安全防御策略。研究结果表明,该设计可提高移动智能终端的安全性,降低移动僵尸网络对个人用户造成的损失,有助于进一步对移动僵尸网络的传播、命令控制机制及控制协议的研究。 In order to solve the problem that the mobile botnet attacks against mobile intelligent terminal, which leads to a large number of personal privacy data disclosure, the author designs and implements a mobile botnet oriented Android platform based on lnternet botnet technology. Based on micro-blogging control, the mobile botnet can complete information stealing, information destroying, SMS spam, etc. On this foundation, the author makes an in-depth analysis of the characteristics of the mobile botnet, finds the attack vulnerabilities and proposes targeted security defense strategy. The results of this study are significant to the research of mobile internet security technology and improve the security of mobile intelligent terminal. It is helpful for further research on the communication, command control mechanism and control protocol of mobile botnet, which reduce the loss caused by the mobile botnet to individual users.
出处 《吉林大学学报(信息科学版)》 CAS 2016年第2期182-185,共4页 Journal of Jilin University(Information Science Edition)
基金 国家自然科学基金资助项目(61271315)
关键词 移动僵尸网络 恶意攻击 ANDROID系统 微博 mobile botnets malicious attacks Android system weibo
  • 相关文献

参考文献10

  • 1刘潇逸,崔翔,郑东华,李善.一种基于Android系统的手机僵尸网络[J].计算机工程,2011,37(22):1-4. 被引量:7
  • 2李娜,杜彦辉,高峰.移动僵尸网络综述[J].信息网络安全,2015(4):19-27. 被引量:4
  • 3方滨兴,崔翔,王威.僵尸网络综述[J].计算机研究与发展,2011,48(8):1315-1331. 被引量:63
  • 4徐建,吴烨虹,程晶晶.移动僵尸网络研究与进展[J].计算机技术与发展,2015,25(5):118-122. 被引量:2
  • 5MULLINER C. Vulnerability Analysis and Attacks on NFC-Enabled Mobile Phones [ C ] //International Conference on Availability, Reliability and Security. Fukuoka, Japan: IEEE, 2009: 695-700.
  • 6李跃,翟立东,王宏霞,时金桥.一种基于社交网络的移动僵尸网络研究[J].计算机研究与发展,2012,49(S2):1-8. 被引量:10
  • 7HU Xin, ZENG Yuanyuan, SHIN KANG. Design of SMS Commanded-and-Controlled and P2P-Structured Mobile Botnets [ C] //Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks. [ S. 1. ] : ACM, 2012(12) : 137-148.
  • 8SINGH K, SANGAL S, JAIN N, et al. Evaluating Bluetooth as a Medium for Botnet Command and Control [ C ]//J Proc of DIMVA'10. Berlin, Germany: Springer, 2010: 61-80.
  • 9PENCHALAIAH N, SESHADRI R. Effective Comparison and Evaluation of DES and Rijndael Algorithm (AES) [ J ]. International Journal on Computer Science and Engineering, 2010, 2 (5) : 1641-1645.
  • 10KNYSZ M, HU Xin, ZENG Yuanyuan, et al. Open WiFi Networks: Lethal Weapons for Botnets? [ C]///Proc of the 31st Annual IEEE International Conference on Computer Communications. [ S. 1. ] : IEEE, 2012: 2631-2635.

二级参考文献158

  • 1杜跃进,崔翔.僵尸网络及其启发[J].中国数据通信,2005,7(5):9-13. 被引量:14
  • 2北京网秦天下科技有限公司.2010 年中国大陆地区手机安全报告[EB/OL].http://www.netqin.com/market/2010 report/,2010-02-24.
  • 3Freiling F,Holz T,Wicherski G.Botnet Tracking: Exploring a Root-cause Methodology to Prevent Distributed Denial-of-service Attacks[C]//Proc.of the 10th European Symposium on Research in Computer Security.Berlin,Germany: Springer,2005.
  • 4Dagon D,Zou C,Lee W.Modeling Botnet Propagation Using Time Zones[C]//Proc.of NDSS’06.Berkeley,USA:[s.n.],2006.
  • 5Ramachandran A,Feamster N,Dagon D.Revealing Botnet Mem- bership Using DNSBL Counter-intelligence[C]//Proc.of the 2nd Conference on Steps to Reducing Unwanted Traffic on the Internet.Berkeley,USA:[s.n.],2006.
  • 6Porras P A,Saidi H,Yegneswaran V.An Analysis of the Ikee.B (Duh) iPhone[C]//Proc.of ICST’10.Berlin,Germany: Springer,2010.
  • 7Schmidt A D,Schmidt H G,Batyuk L,et al.Smartphone Malware Evolution Revisited: Android Next Target?[C]//Proc.of the 4th IEEE International Conference on Malicious and Unwanted Software.[S.l.]: IEEE Computer Society,2009.
  • 8Wang P,Sparks S,Zou C C.An Advanced Hybrid Peer-to-Peer Botnet[C]//Proc.of the 1st Conference on First Workshop on Hot Topics in Understanding Botnets.Berkeley,USA:[s.n.],2007.
  • 9Zeng Yuanyuan,Hu Xin,Shin K G.Design of SMS Commanded and Controlled and P2P-structured Mobile Botnets[EB/OL].[2011-03-20].https://www.eecs.umich.edu/techreports/cse/2010/ CSE-TR-562-10.pdf.
  • 10Singh K,Sangal S,Jain N,et al.Evaluating Bluetooth as a Me- dium for Botnet Command and Control[C]//Proc.of DIMVA’10.Berlin,Germany: Springer,2010.

共引文献75

同被引文献8

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部