全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...
-  2018 

移动僵尸网络的命令与控制信息隐匿技术

Keywords: 移动僵尸网络,命令与控制,消息推送,文本隐写,语言建模

Full-Text   Cite this paper   Add to My Lib

Abstract:

随着移动互联网的发展和普及,越来越多的攻击者通过移动僵尸网络进行犯罪活动.针对推送型移动僵尸网络,提出了一种拟英文自然语言的移动僵尸网络命令和传输机制,通过基于推送内容的隐写方法,将需要传输的控制指令隐藏于推送文本中,使推送文本拟自然语言化,躲避推送服务提供商的异常检测.实验结果表明,这种拟自然语言隐写方法能够根据语料库动态地提升隐写文本的单词嵌入率,隐写文本自然可读,具有良好的传输效率和隐蔽性

References

[1]  中国互联网络信息中心.第38次中国互联网络发展状况统计报告[R].北京:中国互联网络信息中心,2016.CNNIC.Statistical report of the 38th China Internet development[R].Beijing:CNNIC,2016(Ch).
[2]  MULLINER C,SEIFERTIN J P.Rise of the iBots:Owning a telco network[C]//Proceedings of the 5th IEEE International Conference on Malicious and Unwanted So ftware(Malware).Washington D C:IEEE,2010:71-80.DOI:10.1109/MALWARE.2010.5665790.
[3]  ZHAO S,LEE PP C,LUI J,et al.Cloud-based push-styled mobile botnets:A case study of exploiting the cloud to device messaging service[C]//Proceedings of the 28th Annual Computer Security Applications Conference.New York:ACM,2012:119-128.
[4]  SAFAKA I,FRAGOULI C,ARGYRAKI K.Matryoshka:Hiding Secret Communication in Plain Sight[DB/OL].[2017-02-03].http://pdfs.semanticscholar.org/10c6/a2c188bb5aca469ff7b29d87d3de6c800e74.
[5]  CHEN W,GONG P,YU L,et al.An adaptive pushstyled command and control mechanism in mobile botnets[J].Wuhan University Journal of Natural Sciences,2013,18(5):427-434.
[6]  张东娜.基于WordNet的短文本语义相似性计算研究[D].长春:吉林大学,2010.ZHANG D N.The Research of Semantic Similarity Between Short Text Based on Word Net[D].Changchun:Jilin University,2010(Ch).
[7]  CUI X,FANG BX,YIN LH,et al.Andbot:towards advanced mobile botnets[C]//Proceedings of the 4th USENIX conference on Large-scale Exploits and Emergent Threats.Boston:USENIX Association:2011:11.
[8]  BLACKBERRY LIMITED.Push Service[EB/OL].[2017-07-02].http://developer.blackberry.com/services/push/.
[9]  GROSVALD M,ORGUN C O.Free from the cover text:A human-generated natural language approach to text-based steganography[J].Journal o f In formation Hiding and Multimedia Signal Processing,2011,2(2):133-141.
[10]  APPLE INC.Local and Push Notification Programming Guide[EB/OL].[2017-06-02].https://developer.apple.com/library/content/documentation/Networking Internet/Conceptual/RemoteNotificationsPG/AP NSOverview.html#//apple_ref/doc/uid/TP40008194-CH8-SW1.
[11]  深圳市和讯华谷信息技术有限公司.Jpush产品简介[EB/OL].[2017-05-02].https://docs.jiguang.cn/jpush/guideline/intro/.HEXUN HUAGU INFORMATION TECHNOLOGY Co.,ctd.Jpush production Introduction[EB/OL].[2017-05-02].https://docs.jiguang.cn/j push/guideline/intro/(Ch).
[12]  SINGH K,SRIVASTAVA A,GIFFIN J,et al.Evaluating email's feasibility for botnet command and control[C]//Proceedings of IEEE International Conference on Dependable Systems and Networks,2008(DSN 2008).Washington D C:IEEE,2008:376-385.
[13]  陈伟,周诗文,殷承宇.流量自适应的移动僵尸网络云控机制研究[J].通信学报,2014,35(11):32-38.CHEN W,ZHOU S W,YIN C Y.Research on cloudbased traffic adaptive command and control method for mobile botnet[J].Journal on Communications,2014,35(11):32-38(Ch).
[14]  李娜,杜彦辉,陈默.基于短地址混淆和谷歌云推送的移动僵尸网络的构建[J].计算机应用,2015,35(6):1698-1704.LI N,DU Y H,CHEN M.Construction of mobile botnet based on URL shortening services flux and Google cloud messaging for Android[J].Journal of Computer Applications,2015,35(6):1698-1704(Ch).
[15]  CHAND V,ORGUN C O.Exploiting linguistic features in lexical steganography:Design and proof-ofconcept implementation[C]//Proceedings of the 39th Annual Hawaii International Conference on System Sciences.Washington,D C:IEEE Computer Society,2006:126.DOI:10.1109/HICSS.2006.175.
[16]  APVRILLE A.Symbian worm Yxes:Towards mobile botnets?[J].Journal in Computer Virology,2012,8(4):117-131.
[17]  PORRAS P,SAIDI H,YEGNESWARAN V.An Analysis of the iKee.B Iphone Botnet[DB/OL].[2017-07-02].http://www.csl.sri.com/users/vinod/papers/ikee.pdf.DOI:10.1007/978-3-642-17502-2_12.
[18]  WYATT T.Security Alert:Geinimi,Sophisticated New Android Trojan Found in Wild[EB/OL].[2010-12-29].https://blog.lookout.com/security-alert-geinimi-sophisticated-new-android-trojan-found-in-wild.
[19]  GOOGLE INC.Android Cloud to Device Messaging Framework[EB/OL].[2017-07-05].https://developers.goople.com/cloud-messaging/gcm.
[20]  MICROSOFT INC.Push Notifications Overview for Windows Phone[EB/OL].[2017-07-06].http://msdn.microsoft.com/enus/library/ff402558(v=vs.92).aspx.
[21]  AMAZON INC.Simple Notification Service[EB/OL].[2017-07-09].http://aws.amazon.com/sns.
[22]  INDIGO ROSE SOFTWARE CORP.Airbop[EB/OL].[2017-06-02].http://airbop.com.
[23]  王李冬.融合语义和时间因子的微博检索[J].情报杂志,2016,35(4):190-194.WANG L D.Microblog retrieval based on the combination of semantics and temporalfactor[J].Journal of Intellipence,2016,35(4):190-194(Ch).
[24]  LIN D K.An Information-Theoretic Definition of Similarity[DB/OL].[2017-06-19].http://www.mathcs.emory.edu/~choi/courses/reading/lin-98a.pdf.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133