计算机工程与应用 ›› 2019, Vol. 55 ›› Issue (18): 95-102.DOI: 10.3778/j.issn.1002-8331.1808-0035

• 网络、通信与安全 • 上一篇    下一篇

基于恶意短信的伪基站行为可视分析

徐江阳,张慧军,张小龙   

  1. 1.太原理工大学 信息与计算机学院,山西 晋中 030600
    2.山西传媒学院 传媒工程系,山西 晋中 030619
  • 出版日期:2019-09-15 发布日期:2019-09-11

Visual Analysis of Pseudo Base Station Behavior Based on Malicious SMS

XU Jiangyang, ZHANG Huijun, ZHANG Xiaolong   

  1. 1.School of Information and Computer, Taiyuan University of Technology, Jinzhong, Shanxi 030600, China
    2.Department of Media Engineering, Communication University of Shanxi, Jinzhong, Shanxi 030619, China
  • Online:2019-09-15 Published:2019-09-11

摘要: 由于移动通讯机制存在的认证漏洞,不法分子利用可趁之机,使用伪基站大肆散布恶意短信。这不仅打扰到人们的日常生活,更严重地损害了公民的财产权益,造成了极其恶劣的影响。伪基站行为模式的分析为打击伪基站提供了有效依据。然而,现有的研究伪基站行为的方法无法更好地认识伪基站活动的宏观态势,更难以针对伪基站发送的不同类别恶意短信来探索其行为规律,把握其运动模式。针对这些问题,提出基于恶意短信数据进行可视分析的方法。通过设计基于地图的热力视图、散点视图、日历热力视图、时间堆栈视图,开发可视分析系统FBSVA来探求伪基站的行为规律。最后,使用ChinaVis2017公开数据集进行实验,验证了该方法的可行性和有效性。

关键词: 恶意短信, 伪基站, 可视分析, 交互设计

Abstract: Due to the authentication loopholes in the mobile communication mechanism, criminals use the opportunity to use malicious base stations to spread malicious text messages. This not only disturbs people’s daily lives, but also seriously damages citizens’ property rights and interests, resulting in extremely bad impact. The analysis of the pseudo base station behavior mode provides an effective basis for combating pseudo base stations. However, the existing methods for studying the behavior of pseudo base stations can not better understand the macroscopic situation of pseudo base station activity, and it is more difficult to explore the behavior patterns of different types of malicious short messages sent by pseudo base stations and grasp their motion patterns. In response to these problems, this paper proposes a method for visual analysis based on malicious SMS data. By designing a map-based thermal view, scatter view, calendar thermal view, and time stack view, the visual analysis system FBSVA is developed to explore the behavior of pseudo base stations. Finally, using the ChinaVis2017 public data set to conduct experiments, the feasibility and effectiveness of the method are verified.

Key words: malicious messages, pseudo base station, visual analysis, interaction design