期刊文献+

移动互联网信息安全威胁与漏洞分析 被引量:17

Analysis of Mobile Internet Information Security Threats and Vulnerabilities
原文传递
导出
摘要 随着通信技术和互联网技术的深度融合,移动互联网快速发展,无疑已成为业界和学术界共同关注的热点。但伴随着智能移动终端的普及和移动互联网业务的不断创新,移动互联网也面临着新的安全威胁。总结了移动互联网给终端用户、企业信息安全、网络基础设施和国家信息安全带来的威胁,并从入网方式、移动操作系统、移动应用和终端用户四个方面分析移动互联网目前存在的信息安全漏洞,强调整个产业链必须共同努力来构建移动互联网信息安全体系。 With the convergence of communication and Internet technologies, mobile Internet develops quickly and has become the hot topic of industry and academic community. More and more smart mobile devices are produced and new mobile Internet business is created, at the same time, mobile Internet is fa cing more new security threats. This paper summarizes the threats to end users, enterprise information se curity, network infrastructure and national information security, analyses the information security vulnera bilities from aspects of network access, mobile operating system, mobile application and end users, finally emphasizes the importance of the whole industry chain for working together to maintain a secure mobile In ternet ecosystem.
作者 李勇
出处 《通信技术》 2014年第4期439-444,共6页 Communications Technology
关键词 移动互联网 智能移动终端 信息安全威胁 信息安全漏洞 mobile Internet, smart mobile device, information security threats, information security vulnerabilities
  • 相关文献

参考文献12

  • 1中国互联网络信息中心.第32次中国互联网络发展状况统计报告[R].2013-07-17(4). 被引量:26
  • 2工业和信息化部电信研究院.移动互联网白皮书[R],2011. 被引量:6
  • 3张永生,刘保奇.垃圾短信之谜:神秘箱子给j公里内10万手机发信[N].新京报,2013-11-18(A12-A13)[2014-2-28].http://news.sohu.com/20131118/n390292159.shtml. 被引量:1
  • 4MULLINER C, SEIFERT J P, Rise of the iBots: Owning a telco Network[ C]//Proc of the 5th IEEE Int Conf on Malicious and Unwanted Software (Malware). Washing- ton DC : 1EEE Computer Society, 2010 : 71-80. 被引量:1
  • 5TRAYNOR P, LIN M,ONGTANG M,et al. On Cellular Botnets: Measuring the Impact of Malicious Devices on a Cellular Network Core[ C]//Proc of the 16th ACM Conf on CompL, ter and Communications Security. New York:ACM, 2009: 223-234. 被引量:1
  • 6李春林,黄月江,刘建刚,高翔,谢京涛.企业信息安全中的手机防泄密解决方案[J].通信技术,2012,45(12):82-85. 被引量:4
  • 7工业和信息化部电信研究院.移动互联网白皮书[R],2013. 被引量:5
  • 8罗军舟,吴文甲,杨明.移动互联网:终端、网络与服务[J].计算机学报,2011,34(11):2029-2051. 被引量:273
  • 9张宏科,苏伟编著..移动互联网技术[M].北京:人民邮电出版社,2010:164.
  • 10MILLER C. Mobile Attacks and Defense[J]. IEEE Se- curity & Privacy,9(04) :68-70. 被引量:1

二级参考文献184

  • 1慎防泄密,手机杀毒[J].大众硬件,2006(9):121-121. 被引量:1
  • 2中国互联网络信息中心.第27次中国互联网络发展状况统计报告,2011,(27):18-20. 被引量:9
  • 3工业和信息化部电信研究院.移动互联网白皮书.2011.10-28.. 被引量:2
  • 4Singh I, Francisco P, Pakulski K et al. CAPWAP Tunneling Protocol (CTP). June 2005. 被引量:1
  • 5Iino S, Govindan S, Sugiura M, Cheng H. Wireless LAN Control Protocol (WiCoP) (RFC 5414). July 2005. 被引量:1
  • 6Calhoun P, Montemurro M, Stanley D. Control and Provi- sioning of Wireless Access Points (CAPWAP) Protocol Speci- fication (RFC 5415). Mar. 2009. 被引量:1
  • 7Calhoun P, Montemurro M, Stanley D. Control and Provi- sioning of Wireless Access Points (CAPWAP) Protocol Bind- ing for IEEE 802.11 (RFC 5416). Mar. 2009. 被引量:1
  • 8Bernaschi M, Cacace F, Iannello Get al. OpenCAPWAP: An open source CAPWAP implementation for the manage- ment and configuration of WiFi hot-spots. Computer Net- works, 2009, 53(2).. 217-230. 被引量:1
  • 9Bernasehi M, Caeace F, Davoli Aet al. A CAPWAP-based solution for frequency planning in large scale networks of WiFi Hot-Spots. Computer Communications, 2011, 34(11) : 1283-1293. 被引量:1
  • 10Lee M J, Zheng J, Ko Yet al. Emerging standards for wireless mesh technology. IEEE Wireless Communications, 2006, 13(2): 56-63. 被引量:1

共引文献326

同被引文献98

引证文献17

二级引证文献94

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部