Design of SMS commanded-and-controlled and P2P-structured mobile botnets

作者: Yuanyuan Zeng , Kang G. Shin , Xin Hu

DOI: 10.1145/2185448.2185467

关键词:

摘要: Botnets are one of the most serious security threats to Internet and personal computer (PC) users. Although botnets have not yet caused major outbreaks in mobile world, with rapidly-growing popularity smartphones such as Apple's iPhone Android-based phones that store more data gain capabilities than earlier generation handsets, expected become a severe threat soon. In this paper, we propose design botnet makes services is resilient disruption. The utilizes SMS messages for C&C P2P structure its topology. Our simulation results demonstrate modified Kademlia---a structured architecture---is better choice botnet's addition, discuss potential countermeasures defend against threat.

参考文章(20)
Kapil Singh, Samrit Sangal, Nehil Jain, Patrick Traynor, Wenke Lee, Evaluating Bluetooth as a medium for botnet command and control international conference on detection of intrusions and malware and vulnerability assessment. pp. 61- 80 ,(2010) , 10.1007/978-3-642-14215-4_4
Patrick Traynor, William Enck, Patrick McDaniel, Thomas La Porta, Exploiting open functionality in SMS-capable cellular networks Journal of Computer Security. ,vol. 16, pp. 713- 742 ,(2008) , 10.3233/JCS-2007-0308
Guanhua Yan, Stephan Eidenbenz, Emanuele Galli, SMS-Watchdog: Profiling Social Behaviors of SMS Users for Anomaly Detection recent advances in intrusion detection. pp. 202- 223 ,(2009) , 10.1007/978-3-642-04342-0_11
Abhijit Bose, Kang G. Shin, On Mobile Viruses Exploiting Messaging and Bluetooth Services 2006 Securecomm and Workshops. pp. 1- 10 ,(2006) , 10.1109/SECCOMW.2006.359562
William Enck, Machigar Ongtang, Patrick McDaniel, On lightweight mobile phone application certification computer and communications security. pp. 235- 245 ,(2009) , 10.1145/1653662.1653691
Radmilo Racic, Denys Ma, Hao Chen, Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery 2006 Securecomm and Workshops. pp. 1- 10 ,(2006) , 10.1109/SECCOMW.2006.359550
Collin Mulliner, Jean-Pierre Seifert, Rise of the iBots: Owning a telco network international conference on malicious and unwanted software. pp. 71- 80 ,(2010) , 10.1109/MALWARE.2010.5665790
Carlton R. Davis, Stephen Neville, José M. Fernandez, Jean-Marc Robert, John McHugh, Structured Peer-to-Peer Overlay Networks: Ideal Botnets Command and Control Infrastructures? european symposium on research in computer security. pp. 461- 480 ,(2008) , 10.1007/978-3-540-88313-5_30
Ping Wang, Sherri Sparks, Cliff C Zou, An Advanced Hybrid Peer-to-Peer Botnet IEEE Transactions on Dependable and Secure Computing. ,vol. 7, pp. 113- 127 ,(2010) , 10.1109/TDSC.2008.35
Kapil Singh, Abhinav Srivastava, Jonathon Giffin, Wenke Lee, Evaluating email’s feasibility for botnet command and control dependable systems and networks. pp. 376- 385 ,(2008) , 10.1109/DSN.2008.4630106