期刊文献+

手机僵尸网络综述

Survey of Mobile Botnet
在线阅读 下载PDF
导出
摘要 从手机僵尸网络的形成和发展出发,介绍手机僵尸网络的危害,详细阐述SMS模式和An-droid网络模式下手机僵尸网络的工作原理,总结现阶段对手机僵尸网络安全防御的研究。 From the formation and development of mobile botnet, introduces the harm of mobile botnet, and the working principle of mobile botnet based on SMS pattern and Android network pattern. Summaries the research on safety defense on mobile botnet at the present stage.
作者 黄萍
出处 《现代计算机》 2012年第15期27-29,共3页 Modern Computer
关键词 手机僵尸网络 SMS模式 网络模式 安全防御 Mobile Botnet SMS Pattern Network Pattern Safety Defense
  • 相关文献

参考文献9

  • 1方滨兴,崔翔,王威.僵尸网络综述[J].计算机研究与发展,2011,48(8):1315-1331. 被引量:65
  • 2Porras P A, Saidi H, Yegneswaran V. An Analysis of the Ikee. B(Duh) iPhone[C]. Proc. of ICST' 10. Berlin, Germany:Springer, 2010.
  • 3中国计算机报.“手机僵尸病毒”成为移动互联网巨大隐患[EB/OL].http://tech.ifeng.corrdintemet/detail_2010_l1/23/3201580_0.shtml.
  • 4北京网秦天下科技有限公司.2010 年中国大陆地区手机安全报告[EB/OL].http://www.netqin.com/market/2010 report/,2010-02-24.
  • 5Patrick Traynor, Michael Lin, et al.On Cellular Botnets:Mea- suring the Impact of Malicious Devices on a Cellularnetwork Core[R]. ACM Conference on Computer and Communications Security(CCS) , 2009.11.http://www.patrickmcdaniel.org/ pubs/ccs09b.pdf.
  • 6Zeng Yuanyuan, Hu Xin, Shin K G. Design of SMS Com- mandedand Controlled and P2P-Structured Mobile Botnets [EB/OL]. https://www.eecs.umich.edu/techreports/cse/2010/ CSE-TR-562-10.pdf.
  • 7Collin Mulliner. Jean-Pierre Seifet. Rise of the iBots:Owning a Telco Network[J]. 5th IEEE International Conference on Malicious and Unwanted Software(MALWARE), Nancy, Fran- ce,2010.10.
  • 8刘潇逸,崔翔,郑东华,李善.一种基于Android系统的手机僵尸网络[J].计算机工程,2011,37(22):1-4. 被引量:7
  • 9王畅,戴航,孙启禄.智能手机上僵尸网络综述[J].微处理机,2012,33(2):39-44. 被引量:2

二级参考文献88

  • 1杜跃进,崔翔.僵尸网络及其启发[J].中国数据通信,2005,7(5):9-13. 被引量:14
  • 2北京网秦天下科技有限公司.2010 年中国大陆地区手机安全报告[EB/OL].http://www.netqin.com/market/2010 report/,2010-02-24.
  • 3Freiling F,Holz T,Wicherski G.Botnet Tracking: Exploring a Root-cause Methodology to Prevent Distributed Denial-of-service Attacks[C]//Proc.of the 10th European Symposium on Research in Computer Security.Berlin,Germany: Springer,2005.
  • 4Dagon D,Zou C,Lee W.Modeling Botnet Propagation Using Time Zones[C]//Proc.of NDSS’06.Berkeley,USA:[s.n.],2006.
  • 5Ramachandran A,Feamster N,Dagon D.Revealing Botnet Mem- bership Using DNSBL Counter-intelligence[C]//Proc.of the 2nd Conference on Steps to Reducing Unwanted Traffic on the Internet.Berkeley,USA:[s.n.],2006.
  • 6Porras P A,Saidi H,Yegneswaran V.An Analysis of the Ikee.B (Duh) iPhone[C]//Proc.of ICST’10.Berlin,Germany: Springer,2010.
  • 7Schmidt A D,Schmidt H G,Batyuk L,et al.Smartphone Malware Evolution Revisited: Android Next Target?[C]//Proc.of the 4th IEEE International Conference on Malicious and Unwanted Software.[S.l.]: IEEE Computer Society,2009.
  • 8Wang P,Sparks S,Zou C C.An Advanced Hybrid Peer-to-Peer Botnet[C]//Proc.of the 1st Conference on First Workshop on Hot Topics in Understanding Botnets.Berkeley,USA:[s.n.],2007.
  • 9Zeng Yuanyuan,Hu Xin,Shin K G.Design of SMS Commanded and Controlled and P2P-structured Mobile Botnets[EB/OL].[2011-03-20].https://www.eecs.umich.edu/techreports/cse/2010/ CSE-TR-562-10.pdf.
  • 10Singh K,Sangal S,Jain N,et al.Evaluating Bluetooth as a Me- dium for Botnet Command and Control[C]//Proc.of DIMVA’10.Berlin,Germany: Springer,2010.

共引文献71

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部