Botnet command and control based on Short Message Service and human mobility

被引:13
|
作者
Hua, Jingyu [1 ]
Sakurai, Kouichi [1 ]
机构
[1] Kyushu Univ, Nishi Ku, Fukuoka 8190395, Japan
关键词
Mobile botnet; Command and control; Short Message Service; Human mobility;
D O I
10.1016/j.comnet.2012.06.007
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Many serious threats for PCs are spreading to the mobile environment. A mobile botnet, which is a collection of hijacked smartphones under the control of hackers, is one of them. With the quick development of the computing and communication abilities of smartphones, many command and control (C&C) techniques in PC botnets can be easily reused in mobile botnets. However, some particular functions and characteristics of smartphones may provide botmasters with additional means to control their mobile botnets. This paper presents two special C&C mechanisms that leverage Short Message Service and human mobility, respectively. The first one designs a SMS-based flooding algorithm to propagate commands. We theoretically prove that the uniform random graph is the optimal topology for this botnet, and demonstrate its high efficiency and stealth with various simulations. The second one utilizes Bluetooth to transmit botnet commands when hijacked smartphones encounter each other while in motion. We study its performance in a 100 m x 100 m square area with NS-2 simulations, and show that human-mobility characteristics facilitate the command propagation. Even if the infection rate is low, the command can still be effectively propagated provided that the mobility of devices is high. In the end, we propose effective defense strategies against these two special C&C mechanisms. (c) 2012 Elsevier B.V. All rights reserved.
引用
收藏
页码:579 / 597
页数:19
相关论文
共 50 条
  • [1] Botnet command and control techniques
    Heron, Simon
    Network Security, 2007, 2007 (04) : 13 - 16
  • [2] Botnet Command and Control Mechanisms
    Zeidanloo, Hossein Rouhani
    Manaf, Azizah Abdul
    SECOND INTERNATIONAL CONFERENCE ON COMPUTER AND ELECTRICAL ENGINEERING, VOL 1, PROCEEDINGS, 2009, : 564 - 568
  • [3] Whispering Botnet Command and Control Instructions
    Baden, Mathis
    Torres, Christof Ferreira
    Pontiveros, Beltran Borja Fiz
    State, Radu
    2019 CRYPTO VALLEY CONFERENCE ON BLOCKCHAIN TECHNOLOGY (CVCBT 2019), 2019, : 77 - 81
  • [4] A hierarchical hybrid structure for botnet control and command
    Beijing University of Posts and Telecommunications, Beijing 100876, China
    不详
    不详
    Proc. - IEEE Int. Conf. Comput. Sci. Autom. Eng., CSAE, (483-489):
  • [5] Design of a Hybrid Command and Control Mobile Botnet
    Pieterse, Heloise
    Olivier, Martin
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY (ICIW-2013), 2013, : 183 - 192
  • [6] Evaluating Bluetooth as a Medium for Botnet Command and Control
    Singh, Kapil
    Sangal, Samrit
    Jain, Nehil
    Traynor, Patrick
    Lee, Wenke
    DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, 2010, 6201 : 61 - 80
  • [7] A botnet-based command and control approach relying on swarm intelligence
    Castiglione, Aniello
    De Prisco, Roberto
    De Santis, Alfredo
    Fiore, Ugo
    Palmieri, Francesco
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2014, 38 : 22 - 33
  • [8] Design and Implementation of Microcontroller Based Short Message Service Control System
    Prince, Nwankwo Nonso
    2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2013, : 494 - 499
  • [9] Evaluating Email's Feasibility for Botnet Command and Control
    Singh, Kapil
    Srivastava, Abhinav
    Giffin, Jonathon
    Lee, Wenke
    2008 IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS & NETWORKS WITH FTCS & DCC, 2008, : 376 - 385
  • [10] Periodic Behavior in Botnet Command and Control Channels Traffic
    AsSadhan, Basil
    Moura, Jose M. F.
    Lapsley, David
    GLOBECOM 2009 - 2009 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-8, 2009, : 2157 - 2162