Design of Mobile Botnet Based on Open Service

Design of Mobile Botnet Based on Open Service

Fenggang Sun (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China), Lidong Zhai (Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China), Yuejin Du (Alibaba Group, Beijing, China), Peng Wang (Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China) and Jun Li (Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China)
Copyright: © 2016 |Pages: 10
DOI: 10.4018/IJDCF.2016070101
OnDemand PDF Download:
$30.00
List Price: $37.50

Abstract

In recent years, botnet has become one of the most serious security threats to Internet. With the rapid development of mobile network and the popularity of smartphones, botnet began to spread to mobile platform. In order to counter mobile botnet, it is meaningful to study its constructive mechanism and reproduce it. In the past studies, researchers have designed several kinds of mobile botnet model based on various communication channels, such as SMS, Bluetooth, etc. This paper proposed a general mobile botnet model based on open service, and verified its feasibility by implementing it on Android platform. This paper also analyzed this model, and then proposed potential defense strategy in terms of its characteristic, which may provide reliable theoretical and technical support for future prevention and privacy protection.
Article Preview

Background

Definition of Mobile Botnet

Botnet means a computer group that can be controlled by bot-master remotely through a command and control channel (Fang, et al., 2011). The bot-master refers to the attacker who has ability to control the botnet and make it into some particular states. The command and control channel(C&C) is the way bot-master send commands and control the botnet. Through the C&C channel, one bot-master can control several bot machines.

In botnet, a computer controlled by the attacker was called bot node or bot machine. A botnet may contain quantities of bot nodes. By controlling these nodes, the attacker can obtain powerful distributed computing ability and abundant information resources reserve. During the past days, using botnet, attackers have launched various attacks easily, such as distributed denial of service attack (DDOS), spam, phishing, theft of privacy, Trojans, spyware bulk distribution. And even as a platform for the implementation of the second attack. As one of the most effective platform for attack, botnet has become one of the biggest security threats in Internet, and it is the research hotspot in the network security field (Jiang, et al., 2012).

Mobile botnet is the developed version of botnet in mobile platform. Using mobile botnet bot-master can carry out kinds of attacks, for example, spam, order high SP services, theft of privacy, etc. It is a great threat to the privacy and property security of smartphone users (Liu, et al., 2011).

Complete Article List

Search this Journal:
Reset
Open Access Articles: Forthcoming
Volume 9: 4 Issues (2017)
Volume 8: 4 Issues (2016)
Volume 7: 4 Issues (2015)
Volume 6: 4 Issues (2014)
Volume 5: 4 Issues (2013)
Volume 4: 4 Issues (2012)
Volume 3: 4 Issues (2011)
Volume 2: 4 Issues (2010)
Volume 1: 4 Issues (2009)
View Complete Journal Contents Listing