Botnet command and control based on Short Message Service and human mobility

被引:13
|
作者
Hua, Jingyu [1 ]
Sakurai, Kouichi [1 ]
机构
[1] Kyushu Univ, Nishi Ku, Fukuoka 8190395, Japan
关键词
Mobile botnet; Command and control; Short Message Service; Human mobility;
D O I
10.1016/j.comnet.2012.06.007
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Many serious threats for PCs are spreading to the mobile environment. A mobile botnet, which is a collection of hijacked smartphones under the control of hackers, is one of them. With the quick development of the computing and communication abilities of smartphones, many command and control (C&C) techniques in PC botnets can be easily reused in mobile botnets. However, some particular functions and characteristics of smartphones may provide botmasters with additional means to control their mobile botnets. This paper presents two special C&C mechanisms that leverage Short Message Service and human mobility, respectively. The first one designs a SMS-based flooding algorithm to propagate commands. We theoretically prove that the uniform random graph is the optimal topology for this botnet, and demonstrate its high efficiency and stealth with various simulations. The second one utilizes Bluetooth to transmit botnet commands when hijacked smartphones encounter each other while in motion. We study its performance in a 100 m x 100 m square area with NS-2 simulations, and show that human-mobility characteristics facilitate the command propagation. Even if the infection rate is low, the command can still be effectively propagated provided that the mobility of devices is high. In the end, we propose effective defense strategies against these two special C&C mechanisms. (c) 2012 Elsevier B.V. All rights reserved.
引用
收藏
页码:579 / 597
页数:19
相关论文
共 50 条
  • [21] Active Botnet Probing to Identify Obscure Command and Control Channels
    Gu, Guofei
    Yegneswaran, Vinod
    Porras, Phillip
    Stoll, Jennifer
    Lee, Wenke
    25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, 2009, : 241 - +
  • [22] Short message command interface for GSM system
    Tang, MC
    Chou, CN
    Tang, CH
    Pan, DC
    Shih, WK
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED PROCESSING TECHNIQUES AND APPLICATIONS, VOLS I-V, 2000, : 1057 - 1062
  • [23] Leveraging Bitcoin Testnet for Bidirectional Botnet Command and Control Systems
    Franzoni, Federico
    Abellan, Ivan
    Daza, Vanesa
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2020, 2020, 12059 : 3 - 19
  • [24] Honeynet Based Botnet Detection Using Command Signatures
    Bhatia, J. S.
    Sehgal, R. K.
    Kumar, Sanjeev
    ADVANCES IN WIRELESS, MOBILE NETWORKS AND APPLICATIONS, 2011, 154 : 69 - 78
  • [25] Botract: abusing smart contracts and blockchain for botnet command and control
    Alibrahim, Omar
    Malaika, Majid
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2022, 17 (1-2) : 147 - 163
  • [26] Fluxing botnet command and control channels with URL shortening services
    Lee, Sangho
    Kim, Jong
    COMPUTER COMMUNICATIONS, 2013, 36 (03) : 320 - 332
  • [27] Using Behavioral Similarity for Botnet Command-and-Control Discovery
    Jusko, Jan
    Rehak, Martin
    Stiborek, Jan
    Kohout, Jan
    Pevny, Tomas
    IEEE INTELLIGENT SYSTEMS, 2016, 31 (05) : 16 - 23
  • [28] Inference and Analysis of Formal Models of Botnet Command and Control Protocols
    Cho, Chia Yuan
    Babic, Domagoj
    Shin, Eui Chul Richard
    Song, Dawn
    PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 426 - 439
  • [29] Cybercrime at a Scale: A Practical Study of Deployments of HTTP-Based Botnet Command and Control Panels
    Sood, Aditya K.
    Zeadally, Sherali
    Bansal, Rohit
    IEEE COMMUNICATIONS MAGAZINE, 2017, 55 (07) : 22 - 28
  • [30] A framework for detecting botnet command and control communication over an encrypted channel
    Ismail Z.
    Jantan A.
    Yusoff M.N.
    International Journal of Advanced Computer Science and Applications, 2020, 11 (01): : 319 - 326