Cloud-based push-styled mobile botnets

作者: Shuang Zhao , Patrick P. C. Lee , John C. S. Lui , Xiaohong Guan , Xiaobo Ma

DOI: 10.1145/2420950.2420968

关键词:

摘要: Given the popularity of smartphones and mobile devices, botnets are becoming an emerging threat to users network operators. We propose a new form cloud-based push-styled that exploits today's push notification services as means command dissemination. To motivate its practicality, we present control (C&C) channel using Google's Cloud Device Messaging (C2DM) service, develop C2DM botnet specifically for Android platform. strategies enhance scalability large coverage resilience against service disruption. prototype botnet, perform evaluation show is stealthy in generating heartbeat traffic, resource-efficient bandwidth power consumptions, controllable quickly delivering all bots. also discuss how one may deploy demonstrate feasibility launching SMS-Spam-and-Click attack. Lastly, generalize design other platforms, such iOS or Window-based systems, recommend possible defense methods. wide adoption services, believe this type requires special attention from our community.

参考文章(20)
Phillip Porras, Hassen Saïdi, Vinod Yegneswaran, An Analysis of the iKee.B iPhone Botnet security and privacy in mobile information and communication systems. pp. 141- 152 ,(2010) , 10.1007/978-3-642-17502-2_12
Ickin Vural, Hein Venter, Mobile botnet detection using network forensics conference on the future of the internet. ,vol. 6369, pp. 57- 67 ,(2010) , 10.1007/978-3-642-15877-3_7
Guofei Gu, Wenke Lee, Junjie Zhang, BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic network and distributed system security symposium. ,(2008)
Kapil Singh, Samrit Sangal, Nehil Jain, Patrick Traynor, Wenke Lee, Evaluating Bluetooth as a medium for botnet command and control international conference on detection of intrusions and malware and vulnerability assessment. pp. 61- 80 ,(2010) , 10.1007/978-3-642-14215-4_4
Roberto Perdisci, Guofei Gu, Wenke Lee, Junjie Zhang, BotMiner: clustering analysis of network traffic for protocol- and structure-independent botnet detection usenix security symposium. pp. 139- 154 ,(2008)
Yin Lihua, Zang Tianning, Liu Xiaoyi, Fang Binxing, Cui Xiang, Andbot: towards advanced mobile botnets usenix conference on large scale exploits and emergent threats. pp. 11- 11 ,(2011)
J. Oikarinen, D. Reed, Internet Relay Chat Protocol RFC. ,vol. 1459, pp. 1- 65 ,(1993)
Wu Zhou, Yajin Zhou, Xuxian Jiang, Peng Ning, Detecting repackaged smartphone applications in third-party android marketplaces Proceedings of the second ACM conference on Data and Application Security and Privacy - CODASKY '12. pp. 317- 326 ,(2012) , 10.1145/2133601.2133640
Collin Mulliner, Jean-Pierre Seifert, Rise of the iBots: Owning a telco network international conference on malicious and unwanted software. pp. 71- 80 ,(2010) , 10.1109/MALWARE.2010.5665790
Yuanyuan Zeng, Kang G. Shin, Xin Hu, Design of SMS commanded-and-controlled and P2P-structured mobile botnets wireless network security. pp. 137- 148 ,(2012) , 10.1145/2185448.2185467