透過您的圖書館登入
IP:18.118.120.204
  • 學位論文

CIDP Treatment: An Innovative Mobile Botnet Covert Channel based on Caller IDs with P8 Treatment

CIDP Treatment: An Innovative Mobile Botnet Covert Channel based on Caller IDs with P8 Treatment

指導教授 : 許富皓
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


現今手機或電腦上使用各式各樣的應用程式,而惡意程式嵌入在這其中的機率也愈來愈高.因而在未來的應用上,若沒有好好防範,殭屍網路(botnet)就會滲入其中,進而操控使用者的手機或電腦及奪取控制權。手機帶給了我們便利,然而使用上的安全性亦愈來愈受到重視。現實世界中,因為應用上情境的不同,以往在個人電腦上所使用的安全機制,雖然有些或許可以直接應用,但大部分的機制很有可能因為使用目的以及架構設計上的不同,使得過去以主機型電腦為討論對象的安全機制,在智慧型手機上似乎已經無用武之地。 智慧型手機(廣義來說,行動智慧型裝置)在現代社會扮演著重要的角色。隨著資訊時代網路上的各種應用,智慧型手機帶來了便利,但也引發相關的安全議題。本文提出一個利用來電顯示號碼(Caller ID),來做為殭屍網路在智慧型手機上的隱蔽通道,達成控制的一個可能方式:CIDP Treatment。為了加強傳遞上的效率,我們對於此新穎的隱蔽通道設計了一種處理這些號碼數字的無損編碼壓縮法 — 完全8度編碼(Perfect Octave Coding; P8 Coding)來最佳化此隱蔽通道的通訊傳輸效率。

並列摘要


Nowadays we use a variety of applications on mobile phones or personal computers, and the probability of malware embedding is growing high. If there is not any robust prevention in the future, botnet will penetrate, and then manipulate the user’s mobile phones or computers and seize the authority of control. Mobile phones brought us much convenience, but also the safety of the use on it has been received more attention. In real world, because of the difference of application scenarios, the security mechanism on a personal computer in the past, although some may be directly applied, most likely seems to be no avail in smart phones, for the purpose of use as well as on different architecture. Smart phones (broadly speaking, mobile smart devices) in modern society play an important role. With the applications on the network, smart phones bring the convenience, but also led to many related security issues. This paper presents a possible way, CIDP Treatment, to achieve the control of a mobile botnet by using caller ID numbers as an innovative covert channel. We design an innovative lossless data compression treatment -- Perfect Octave Coding (P8 Coding) for this new covert channel to enhance the efficiency of the data transmission.

參考文獻


[13] A Framework for P2P Botnets. Su Chang, Linfeng Zhang, Yong Guan, Thomas E. Daniels. 2009. 2009 International Conference on Communications and Mobile Computing.
[11] Wenke Lee, Cliff Wang, David Dagon, [ed.]. Botnet Detection-Countering the Largest Security Threat. s.l. : Springer, 2008.
[1] Yuanyuan Zeng, Kang G. Shin and Xin Hu. Design of SMS Commanded-and-Controlled and P2P-Structured Mobile Botnets. The University of Michigan. 2010. Technical Report .
[2] Schipka, Maksym. Dollars for downloading. Network Security. January 2009, Vol. 2009, 1, pp. 7-11.
[5] Mulliner, Collin. Smartphone Botnets. 2010.