Font Size: a A A

Research Of Mobile Device Oriented Botnet’s Key Technologies

Posted on:2015-01-14Degree:MasterType:Thesis
Country:ChinaCandidate:Y T WangFull Text:PDF
GTID:2298330422990901Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
The mobile Internet is at a stage of rapid development, it have already made greatprogress in the mobile terminal and platform, mobile network technology, mobile phonesoftware application etc. With its abundant functions, smart phone not only meet thecommunication needs of mobile phone users, but also meet the mobile officing, Internetand entertainment needs. Therefore, smart mobile phone occupies a large share in themobile terminal and become most of the mobile phone users’ choice; this also leadssmart phones to become the main target of the Trojan virus attacks.Mobile botnet virus on smart mobile phone was discovered around November2009. Since then, the quantity of mobile botnet virus increased in a high speed, and withits rich control and attack methods, mobile botnet virus caused great harm to users andserious threat to the mobile network security. Therefore, this paper analyzes the researchbackground, significance and current status of mobile botnet in order to take deep studyon the key technologies of botnet for mobile devices.First, this paper analyzes the background significance and status of mobile botnet.First, this paper proposes the overall flow of communication protocols of the botnet forAndroid platform. This paper uses ETag value and JSON format to transfer hiddeninformation in order to achieve protocol camouflage, uses RSA and AES keymanagement mechanism, and optimize heartbeat packets with different mechanismsaccording to the network type.Second, this paper proposes overall structure of the Android platform botnetprogram, and fulfills all modules of botnet client and server to achieve the Androidplatform botnet system.Finally, this paper tests the Android platform botnet program, including the overallrunning tests, safety testing and performance testing. In the overall running tests, thispaper mainly tests the normal operating conditions of the system and the functions ofupgrades, destruction and migration. Security testing mainly includes protocol statistics,protocol analysis, and monitoring and replay attacks. Performance testing mainlyincludes protocol analysis, power consumption and traffic consumption tests. The test results prove that the Android platform botnet program designed in this paper runsproperly and has good security and acceptable performance.
Keywords/Search Tags:Mobile botnets, Android, communication protocol, safety
PDF Full Text Request
Related items