期刊文献+

移动蜜罐MHP的设计和实现

Mobile honey pot design and implementation
下载PDF
导出
摘要 针对移动终端恶意软件泛滥的现状,提出一种诱骗、捕获、分析恶意软件的移动蜜罐(mobile honey pot,MHP)技术。MHP包含3个核心模块,环境欺骗模块构造出具有诱骗性的安全资源;恶意行为捕获模块通过监听通信端口、扫描系统内存、识别敏感权限来捕获恶意行为;恶意数据分析模块分析捕获数据,识别和定位安全威胁的类型和根源。结果表明:MHP可有效地捕获和识别恶意行为并适于在移动终端部署应用。 Aiming at the increasing attacks to intelligent mobile terminals, MHP (mobile honeypot) is proposed to decoy, capture and analyze malwares. MHP contains'three kernel modules: the decoy module creates fraudulent envi- ronment, the malicious behavior capture module catches malicious behaviors through monitoring communication port, scanning system memory and identifying sensitive permissions and the malicious data analyzing module in- dentifies the types of security threats. Results show that MHP can capture malicious behavior effectively and is suitable for deploying on mobile terminals.
作者 谢丽霞 王冲 XIE Lixia WANG Chong(College of Computer Science and Technology, CA UC, Tianjin 300300, Chin)
出处 《中国民航大学学报》 CAS 2016年第5期45-50,共6页 Journal of Civil Aviation University of China
基金 国家科技重大专项(2012ZX03002002) 国家自然科学基金项目(60776807 61179045) 天津市科技计划重点项目(09JCZDJC16800)
关键词 恶意行为 移动蜜罐 欺骗环境 行为捕获 malicious behavior mobile honeypot fraudulent environment behaviors intercept
  • 相关文献

参考文献16

  • 1SYMBIAN. Sistema Operacional Symbian[EB/OL]. [2012-03-01 ].http : //licensing.symbian.org.
  • 2DUNHAM K. Mobile malware attacks and defence[J]. Elsevier, 2009, 7 (3): 137-146.
  • 3SPITZNERL.Honeypot:TrackingHackers[M].北京:清华大学出版社.2004:30-35.
  • 4诸葛建伟,唐勇,韩心慧,段海新.蜜罐技术研究与应用进展[J].软件学报,2013,24(4):825-842. 被引量:81
  • 5MICHAEL V, JUSTIN M, JAY C, et al. Scalabilit Delity and Contain- ment in the Potelnkin Virtual Honeyfarm[C]//Proceedings of the ACM- Symposium on Operating System Principles, USA, 2005:71-84.
  • 6PROVOS N. Honeyd: A Virtual Honeypot Daemon[R]. Addison-Wes- ley, 2003: 189-194.
  • 7Nepenhes Readme[EB/OL]. [2009-03-20]. http ://nepenthes.carnivore. it/documentation: readme.
  • 8ZOLFAGHAR K, MOHAMMADI S. Securing Bluetooth-Based Payment System Using Honeypot[C]//International Conference on Innovations in Information Technology, San Francisco, 2009: 21-25.
  • 9GOBEL J. Automatic Capturing of Malicious Software[R]. Mannheim: University of Mannheim, 2010.
  • 10SPITZNER L. Honeypots: Catching the InsiderThreat[C]//2003 IEEE Computer Security Applications Conference, California, USA, 2003: 170-179.

二级参考文献5

共引文献80

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部