[1]徐建,吴烨虹,程晶晶. 移动僵尸网络研究与进展[J].计算机技术与发展,2015,25(05):118-122.
 XU Jian,WU Ye-hong,CHENG Jing-jing. Research and Development of Mobile Botnets[J].,2015,25(05):118-122.
点击复制

 移动僵尸网络研究与进展()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
25
期数:
2015年05期
页码:
118-122
栏目:
安全与防范
出版日期:
2015-05-10

文章信息/Info

Title:
 Research and Development of Mobile Botnets
文章编号:
1673-629X(2015)05-0001-04
作者:
 徐建吴烨虹程晶晶
 南京邮电大学 计算机学院
Author(s):
 XU JianWU Ye-hongCHENG Jing-jing
关键词:
 移动僵尸网络蓝牙无线网络命令控制
Keywords:
 mobile BotnetBluetoothWiFiC&C
分类号:
TP309
文献标志码:
A
摘要:
 僵尸网络是计算机重要的安全威胁。随着智能终端的发展,这一安全威胁出现在移动设备平台上。在了解传统僵尸网络传播原理和控制方式的基础上,对移动僵尸网络的传播、命令控制机制以及控制协议进行了深入研究,并简单介绍了移动僵尸网络的危害以及对它的防御。移动僵尸网络主要是存在于移动设备上的僵尸网络,它是以一般的僵尸网络理论为基础,建立的一种新型的网络攻击形式。而且今后移动僵尸网络将会严重影响人们的生活。因此必须不断地分析和掌握在不同网络环境下的命令控制协议,保证每个用户都能远离网络攻击的威胁。
Abstract:
 Botnet is an important threat on computer security. As the development of mobile terminals,the security threat rises on mobile device platforms. Based on understanding the traditional Botnet propagation principle and control mode,the spread of mobile Botnet and command and control mechanisms and control protocol are studied in-depth,also introduce the hazards and its defense of mobile Botnet briefly. Mobile Botnet is mainly existed in a Botnet on a mobile device,which is a new form of network attack established based on the general theory of the Botnet. In the future,mobile Botnet will seriously affect the people’s life. Therefore must constantly analyze and grasp C&C protocol in different network environment,ensuring that each user can be far away from the threat of cyber attacks.

相似文献/References:

[1]张志宏,吴庆波,邵立松,等.基于飞腾平台TOE协议栈的设计与实现[J].计算机技术与发展,2014,24(07):1.
 ZHANG Zhi-hong,WU Qing-bo,SHAO Li-song,et al. Design and Implementation of TCP/IP Offload Engine Protocol Stack Based on FT Platform[J].,2014,24(05):1.
[2]梁文快,李毅. 改进的基因表达算法对航班优化排序问题研究[J].计算机技术与发展,2014,24(07):5.
 LIANG Wen-kuai,LI Yi. Research on Optimization of Flight Scheduling Problem Based on Improved Gene Expression Algorithm[J].,2014,24(05):5.
[3]黄静,王枫,谢志新,等. EAST文档管理系统的设计与实现[J].计算机技术与发展,2014,24(07):13.
 HUANG Jing,WANG Feng,XIE Zhi-xin,et al. Design and Implementation of EAST Document Management System[J].,2014,24(05):13.
[4]侯善江[],张代远[][][]. 基于样条权函数神经网络P2P流量识别方法[J].计算机技术与发展,2014,24(07):21.
 HOU Shan-jiang[],ZHANG Dai-yuan[][][]. P2P Traffic Identification Based on Spline Weight Function Neural Network[J].,2014,24(05):21.
[5]李璨,耿国华,李康,等. 一种基于三维模型的文物碎片线图生成方法[J].计算机技术与发展,2014,24(07):25.
 LI Can,GENG Guo-hua,LI Kang,et al. A Method of Obtaining Cultural Debris’ s Line Chart Based on Three-dimensional Model[J].,2014,24(05):25.
[6]翁鹤,皮德常. 混沌RBF神经网络异常检测算法[J].计算机技术与发展,2014,24(07):29.
 WENG He,PI De-chang. Chaotic RBF Neural Network Anomaly Detection Algorithm[J].,2014,24(05):29.
[7]刘茜[],荆晓远[],李文倩[],等. 基于流形学习的正交稀疏保留投影[J].计算机技术与发展,2014,24(07):34.
 LIU Qian[],JING Xiao-yuan[,LI Wen-qian[],et al. Orthogonal Sparsity Preserving Projections Based on Manifold Learning[J].,2014,24(05):34.
[8]尚福华,李想,巩淼. 基于模糊框架-产生式知识表示及推理研究[J].计算机技术与发展,2014,24(07):38.
 SHANG Fu-hua,LI Xiang,GONG Miao. Research on Knowledge Representation and Inference Based on Fuzzy Framework-production[J].,2014,24(05):38.
[9]叶偲,李良福,肖樟树. 一种去除运动目标重影的图像镶嵌方法研究[J].计算机技术与发展,2014,24(07):43.
 YE Si,LI Liang-fu,XIAO Zhang-shu. Research of an Image Mosaic Method for Removing Ghost of Moving Targets[J].,2014,24(05):43.
[10]余松平[][],蔡志平[],吴建进[],等. GSM-R信令监测选择录音系统设计与实现[J].计算机技术与发展,2014,24(07):47.
 YU Song-ping[][],CAI Zhi-ping[] WU Jian-jin[],GU Feng-zhi[]. Design and Implementation of an Optional Voice Recording System Based on GSM-R Signaling Monitoring[J].,2014,24(05):47.
[11]徐建. 一种基于 SMS 的移动僵尸网络的设计及分析[J].计算机技术与发展,2016,26(01):106.
 XU Jian. Design and Analysis of a SMS-based Mobile Botnet[J].,2016,26(05):106.
[12]徐建,吴烨虹,程晶晶. 移动僵尸网络中数据流的采集与分析[J].计算机技术与发展,2016,26(11):101.
 XU Jian,WU Ye-hong,CHENG Jing-jing. Collection and Analysis of Data Flow in Mobile Botnet[J].,2016,26(05):101.
[13]徐建. 移动僵尸网络检测方法研究[J].计算机技术与发展,2016,26(12):117.
 XU Jian. Investigation on Mobile Botnets Detecting[J].,2016,26(05):117.

更新日期/Last Update: 2015-07-09