期刊文献+

An Adaptive Push-Styled Command and Control Mechanism in Mobile Botnets 被引量:6

An Adaptive Push-Styled Command and Control Mechanism in Mobile Botnets
原文传递
导出
摘要 The mobile botnet, developed from the traditional PC-based botnets, has become a practical underlying trend. In this paper, we design a mobile botnet, which exploits a novel command and control (CC) strategy named Push-Styled CC. It utilizes Google cloud messaging (GCM) service as the botnet channel. Compared with traditional botnet, Push-Styled CC avoids direct communications between botmasters and bots, which makes mobile botnets more stealthy and resilient. Since mobile devices users are sensitive to battery power and traffic consumption, Push- Styled botnet also applies adaptive network connection strategy to reduce traffic consumption and cost. To prove the efficacy of our design, we implemented the prototype of Push-Style CC in Android. The experiment results show that botnet traffic can be concealed in legal GCM traffic with low traffic cost. The mobile botnet, developed from the traditional PC-based botnets, has become a practical underlying trend. In this paper, we design a mobile botnet, which exploits a novel command and control (CC) strategy named Push-Styled CC. It utilizes Google cloud messaging (GCM) service as the botnet channel. Compared with traditional botnet, Push-Styled CC avoids direct communications between botmasters and bots, which makes mobile botnets more stealthy and resilient. Since mobile devices users are sensitive to battery power and traffic consumption, Push- Styled botnet also applies adaptive network connection strategy to reduce traffic consumption and cost. To prove the efficacy of our design, we implemented the prototype of Push-Style CC in Android. The experiment results show that botnet traffic can be concealed in legal GCM traffic with low traffic cost.
机构地区 College of Computer
出处 《Wuhan University Journal of Natural Sciences》 CAS 2013年第5期427-434,共8页 武汉大学学报(自然科学英文版)
基金 Supported by the National Natural Science Foundation of China (61202353, 61272084, 61272422) Graduate Innovation Foundation of Jiangsu Province (CXLX13_464) Natural Science Foundation of Jiangsu Higher Education Institutions (12KJB520008)
关键词 mobile botnet push style Google cloud messaging (GCM) adaptive connection mobile botnet push style Google cloud messaging (GCM) adaptive connection
  • 相关文献

参考文献21

  • 1Axelle A. Symbian worm yxes towards mobile botnets [EB/OL]. [2011-06-10]. http://www.fortiguard.com/papers/ EICAR2010_Symbian- Yxes_Towards-Mobile-Botnets.pdf. 被引量:1
  • 2Porras P, Sa~di H, Yegneswaran V. An analysis of the ikee. b iphone botnet[J]. Security and Privacy in Mobile Informa- tion andCommunication Systems, 2010, 47(12): 141-152. 被引量:1
  • 3Lookout Inc. Security alert: Geinimi, sophisticated new an- droid trojan found in wild [EB/OL]. [2010-12-29]. http:// blog.mylookout.com/b log/2010/12/29/geinimi_trojan. 被引量:1
  • 4Google Inc. Google cloud messaging for android [EB/OL]. [2012-08-13 ]. http ://developer. android, com/google/gcrrdindex. html. 被引量:1
  • 5Zhao S, Lee P, Lui J, et al.Cloud-based push-styled mobile botnets: A case study of exploiting the cloud to device mes- saging service [C]//Proeeedings of the 28th Annual Com- puter Security Applications Conference (ACSAC), New Or- leans, Louisiana, New York: ACM Press, 2012:119-128. 被引量:1
  • 6Cui X, Fang B X, Yin L H, et al. Andbot: towards advanced mobile bomets [C]//Proeeedings of the 4th USENIX Con- ference on Large-Scale Exploits and Emergent Threats, set. (LEET' 11). Berkeley: USENIX Association, 2011:11-17. 被引量:1
  • 7Traynor P, Lin M, Ongtang M, et al. Oncellular botnets: measuring the impact of malicious devices on a cellular networkcore [C]//Proc of the 16th A CM Conf on Computer and Communications Security. New York: ACM Press, 2009 223-234. 被引量:1
  • 8Singh K, Sangal S, Jain N, et al. Evaluating bluetooth as a medium for botnet command and control [C]//Proc of the Conf on Detection of Intrusions and Malware, and Vulner- ability Assessment. Berlin: Springer-Verlag, 2010: 61-80. 被引量:1
  • 9Zeng Y, Shin K G, Hu X. Design of SMS commanded-and controlled and P2P-structured mobile botnet. Proceedings of the Fifth ACM Conference on Security and Privacy in Wire- less and Mobile Networks, ser. WISEC' 12. New York: ACM Press, 2012: 137-148. 被引量:1
  • 10Geng G, Xu G, Zhang M, et al. An improved SMS based heterogeneous mobile botnet model [C]//In Proceedings of 1EEE International Conference on Information and Automa- tion (ICIA). New York: IEEE Press, 2011: 198-202. 被引量:1

同被引文献112

  • 1李跃,翟立东,王宏霞,时金桥.一种基于社交网络的移动僵尸网络研究[J].计算机研究与发展,2012,49(S2):1-8. 被引量:10
  • 2SCHMIDT A D, SCHMIDT H G, BATYUK L, et al. Smartphone malware evolution revisited: android next target?[A].Proceeding of 4th International Conference on Malicious and Unwanted Software (MALWARE)[C]. Piscataway, N J, USA, 2009. 1-7. 被引量:1
  • 3PORRAS P, SAIDI H, YEGNESWARAN V. An analysis of the iKee B iPhone botnet[A]. Proceedings of the 2nd International ICST Confer- ence on Security and Privacy on Mobile Information and Communica- tions Systems (Mobisec)[C]. Piscataway, N J, USA, 2010. 141 - 152. 被引量:1
  • 4CUI X, FANG B, YIN L, et al. Andbot: toward sadvancedmo bilebot- nets[A]. Proceedings of the 4th USENIX Conference on Large-Scale Exploits and Emergent Threats[C]. 2011.11. 被引量:1
  • 5ZENG Y, SHIN K G, HU X. Design of SMS commanded-and-con- trolled and P2P-sructured mobile botnets[A]. Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks[C]. New York, NY, USA, 2012. 137-148. 被引量:1
  • 6MULL1NER C, MILLER C. Fuzzing the phone in your phone[EB/OL]. http://www.blackhat.com/presentations/bh-usa-09/MILLER/BHUSA0 9-Miller-FuzzingPhone-PAPER. 被引量:1
  • 7MULL1NER C, SEIFERTJ P. Rise of the iBots: owning a telco net- work[A]. Proceedings of the 5th IEEE Intemational Conference on Malicious and Unwanted Software (Malware)[C]. Nancy, France, 2010.71-80. 被引量:1
  • 8SINGH K, SRIVASTAVA A, GIFFIN J, et al. Evaluating email's fea- sibility for botnet command and control[A]. Proceedings of IEEEInternational Conference on Dependable Systems and Networks (DSN)[C]. Piscataway, NJ, USA, 2008.376-385. 被引量:1
  • 9ZHAO S, LEE P P C, LUI J, et aL Cloud-based push-styled mobile botnets: a case study of exploiting the cloud to device messaging ser- vice[A]. Proceedings of the 28th Annual Computer Security Applica- tions Conference[C]. New York, NY, USA, 2012.119-128. 被引量:1
  • 10GU G, ZHANG J, LEE W. BotSniffer: detecting botnet command and control channels in network traffic[A]. Proceedings of the 15th Annual Network and Distributed System Security Symposium (NDSS'08)[C]. San Diego, CA, 2008. 被引量:1

引证文献6

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部