[1]徐建. 一种基于 SMS 的移动僵尸网络的设计及分析[J].计算机技术与发展,2016,26(01):106-110.
 XU Jian. Design and Analysis of a SMS-based Mobile Botnet[J].,2016,26(01):106-110.
点击复制

 一种基于 SMS 的移动僵尸网络的设计及分析()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
26
期数:
2016年01期
页码:
106-110
栏目:
安全与防范
出版日期:
2016-01-10

文章信息/Info

Title:
 Design and Analysis of a SMS-based Mobile Botnet
文章编号:
1673-629X(2016)01-0106-05
作者:
 徐建
 南京邮电大学 计算机学院
Author(s):
 XU Jian
关键词:
 移动僵尸网络命令控制P2P拓扑结构
Keywords:
 mobile botnetC&CP2Ptopology
分类号:
TP309
文献标志码:
A
摘要:
 僵尸网络是计算机重要的安全威胁。随着智能手机的发展,这一安全威胁出现在智能手机上。现在手机中毒已成为普遍现象,在研究了手机传播病毒方式的基础上,对移动僵尸网络的传播、命令控制机制以及控制协议进行了深入研究,分别分析了结构化和非结构化的拓扑结构,用示例来描述如何将 SMS 信息的 C&C 通道与 P2P 的拓扑结构相结合,对基于 SMS 的移动僵尸网络进行设计和分析。对于移动僵尸网络这种新型的手机病毒攻击模式将会严重影响人们的生活,因此必须不断地研究、发现各种威胁手机的行为。
Abstract:
 Botnet is an important threat on computer security. As the development of smart phones,the security threats appeared on the smart phones. Now mobile phone infected virus has become a common phenomenon. Based on the research of mobile phone virus sprea-ding on the way,the spread,command and control mechanisms,and control protocol of mobile botnet are studied in-depth,respectively analyzing the topology of structured and unstructured. Use example to describe how to combine SMS C&C and P2P structure. Based on the SMS mobile botnet,carry on the design and analysis. For mobile botnet,a new type of virus attack mode for mobile phone,will seri-ously affect people’s life,so the continuous study is done and the behavior of the various threats to mobile phones is found.

相似文献/References:

[1]张志宏,吴庆波,邵立松,等.基于飞腾平台TOE协议栈的设计与实现[J].计算机技术与发展,2014,24(07):1.
 ZHANG Zhi-hong,WU Qing-bo,SHAO Li-song,et al. Design and Implementation of TCP/IP Offload Engine Protocol Stack Based on FT Platform[J].,2014,24(01):1.
[2]梁文快,李毅. 改进的基因表达算法对航班优化排序问题研究[J].计算机技术与发展,2014,24(07):5.
 LIANG Wen-kuai,LI Yi. Research on Optimization of Flight Scheduling Problem Based on Improved Gene Expression Algorithm[J].,2014,24(01):5.
[3]黄静,王枫,谢志新,等. EAST文档管理系统的设计与实现[J].计算机技术与发展,2014,24(07):13.
 HUANG Jing,WANG Feng,XIE Zhi-xin,et al. Design and Implementation of EAST Document Management System[J].,2014,24(01):13.
[4]侯善江[],张代远[][][]. 基于样条权函数神经网络P2P流量识别方法[J].计算机技术与发展,2014,24(07):21.
 HOU Shan-jiang[],ZHANG Dai-yuan[][][]. P2P Traffic Identification Based on Spline Weight Function Neural Network[J].,2014,24(01):21.
[5]李璨,耿国华,李康,等. 一种基于三维模型的文物碎片线图生成方法[J].计算机技术与发展,2014,24(07):25.
 LI Can,GENG Guo-hua,LI Kang,et al. A Method of Obtaining Cultural Debris’ s Line Chart Based on Three-dimensional Model[J].,2014,24(01):25.
[6]翁鹤,皮德常. 混沌RBF神经网络异常检测算法[J].计算机技术与发展,2014,24(07):29.
 WENG He,PI De-chang. Chaotic RBF Neural Network Anomaly Detection Algorithm[J].,2014,24(01):29.
[7]刘茜[],荆晓远[],李文倩[],等. 基于流形学习的正交稀疏保留投影[J].计算机技术与发展,2014,24(07):34.
 LIU Qian[],JING Xiao-yuan[,LI Wen-qian[],et al. Orthogonal Sparsity Preserving Projections Based on Manifold Learning[J].,2014,24(01):34.
[8]尚福华,李想,巩淼. 基于模糊框架-产生式知识表示及推理研究[J].计算机技术与发展,2014,24(07):38.
 SHANG Fu-hua,LI Xiang,GONG Miao. Research on Knowledge Representation and Inference Based on Fuzzy Framework-production[J].,2014,24(01):38.
[9]叶偲,李良福,肖樟树. 一种去除运动目标重影的图像镶嵌方法研究[J].计算机技术与发展,2014,24(07):43.
 YE Si,LI Liang-fu,XIAO Zhang-shu. Research of an Image Mosaic Method for Removing Ghost of Moving Targets[J].,2014,24(01):43.
[10]余松平[][],蔡志平[],吴建进[],等. GSM-R信令监测选择录音系统设计与实现[J].计算机技术与发展,2014,24(07):47.
 YU Song-ping[][],CAI Zhi-ping[] WU Jian-jin[],GU Feng-zhi[]. Design and Implementation of an Optional Voice Recording System Based on GSM-R Signaling Monitoring[J].,2014,24(01):47.
[11]徐建,吴烨虹,程晶晶. 移动僵尸网络研究与进展[J].计算机技术与发展,2015,25(05):118.
 XU Jian,WU Ye-hong,CHENG Jing-jing. Research and Development of Mobile Botnets[J].,2015,25(01):118.
[12]徐建,吴烨虹,程晶晶. 移动僵尸网络中数据流的采集与分析[J].计算机技术与发展,2016,26(11):101.
 XU Jian,WU Ye-hong,CHENG Jing-jing. Collection and Analysis of Data Flow in Mobile Botnet[J].,2016,26(01):101.
[13]徐建. 移动僵尸网络检测方法研究[J].计算机技术与发展,2016,26(12):117.
 XU Jian. Investigation on Mobile Botnets Detecting[J].,2016,26(01):117.

更新日期/Last Update: 2016-04-13