期刊文献+

移动僵尸网络的命令与控制信息隐匿技术 被引量:1

Steganography Techniques for Command and Control Information of Mobile Botnet
原文传递
导出
摘要 随着移动互联网的发展和普及,越来越多的攻击者通过移动僵尸网络进行犯罪活动.针对推送型移动僵尸网络,提出了一种拟英文自然语言的移动僵尸网络命令和传输机制,通过基于推送内容的隐写方法,将需要传输的控制指令隐藏于推送文本中,使推送文本拟自然语言化,躲避推送服务提供商的异常检测.实验结果表明,这种拟自然语言隐写方法能够根据语料库动态地提升隐写文本的单词嵌入率,隐写文本自然可读,具有良好的传输效率和隐蔽性. With the development of mobile Internet,more and more attackers use mobile botnet to commit cyber crimes.A transmission mechanism,where every command for controlling is hidden in human-like message,was proposed for mobile botnet relying on push server.Through the text steganography method,the command which needs to be transmitted is hidden in the human-like pushing text to avoid the anomaly detection.The experimental results show that this steganography mechanism with high transmission efficiency and invisibility dynamically enhances the average covert rate according to the corpus and that the stegotext is readable and natural.
作者 陈松健 陈伟 戴成瑞 CHEN Songjian;CHEN Wei;DAI Chengrui(College of Computer, Nanjing University of Posts and Telecommunications, Nanjing 210023, Jiangsu, China)
出处 《武汉大学学报(理学版)》 CAS CSCD 北大核心 2018年第2期133-140,共8页 Journal of Wuhan University:Natural Science Edition
基金 国家自然科学基金资助项目(61602258)
关键词 移动僵尸网络 命令与控制 消息推送 文本隐写 语言建模 mobile botnet command and control message push text steganography language modeling
  • 相关文献

参考文献4

二级参考文献76

  • 1李跃,翟立东,王宏霞,时金桥.一种基于社交网络的移动僵尸网络研究[J].计算机研究与发展,2012,49(S2):1-8. 被引量:10
  • 2Axelle A. Symbian worm yxes towards mobile botnets [EB/OL]. [2011-06-10]. http://www.fortiguard.com/papers/ EICAR2010_Symbian- Yxes_Towards-Mobile-Botnets.pdf.
  • 3Porras P, Sa~di H, Yegneswaran V. An analysis of the ikee. b iphone botnet[J]. Security and Privacy in Mobile Informa- tion andCommunication Systems, 2010, 47(12): 141-152.
  • 4Lookout Inc. Security alert: Geinimi, sophisticated new an- droid trojan found in wild [EB/OL]. [2010-12-29]. http:// blog.mylookout.com/b log/2010/12/29/geinimi_trojan.
  • 5Google Inc. Google cloud messaging for android [EB/OL]. [2012-08-13 ]. http ://developer. android, com/google/gcrrdindex. html.
  • 6Zhao S, Lee P, Lui J, et al.Cloud-based push-styled mobile botnets: A case study of exploiting the cloud to device mes- saging service [C]//Proeeedings of the 28th Annual Com- puter Security Applications Conference (ACSAC), New Or- leans, Louisiana, New York: ACM Press, 2012:119-128.
  • 7Cui X, Fang B X, Yin L H, et al. Andbot: towards advanced mobile bomets [C]//Proeeedings of the 4th USENIX Con- ference on Large-Scale Exploits and Emergent Threats, set. (LEET' 11). Berkeley: USENIX Association, 2011:11-17.
  • 8Traynor P, Lin M, Ongtang M, et al. Oncellular botnets: measuring the impact of malicious devices on a cellular networkcore [C]//Proc of the 16th A CM Conf on Computer and Communications Security. New York: ACM Press, 2009 223-234.
  • 9Singh K, Sangal S, Jain N, et al. Evaluating bluetooth as a medium for botnet command and control [C]//Proc of the Conf on Detection of Intrusions and Malware, and Vulner- ability Assessment. Berlin: Springer-Verlag, 2010: 61-80.
  • 10Zeng Y, Shin K G, Hu X. Design of SMS commanded-and controlled and P2P-structured mobile botnet. Proceedings of the Fifth ACM Conference on Security and Privacy in Wire- less and Mobile Networks, ser. WISEC' 12. New York: ACM Press, 2012: 137-148.

共引文献8

同被引文献4

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部