Skip to main content

Control Method of Twitter- and SMS-Based Mobile Botnet

  • Conference paper
Trustworthy Computing and Services (ISCTCS 2012)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 320))

Included in the following conference series:

Abstract

Along with the rapid development of mobile network, the botnet is shifting from traditional network to mobile one. The mobile botnet has already become a focus of future internet security. With wide application of twitter and with its characteristics of real-time, asynchronous and loose coupling communication, the mobile internet becomes a more controllable and more concealed information platform carrier for the mobile botnet. Communication quality of the mobile network SMS service is stable with independent of the communication mechanism. SMS services can provide a stable and robust communication environment for mobile botnet. This paper puts forward a mobile botnet based upon twitter and SMS control. Based on this, the author puts forward two common algorithm for network topologies according to real application environment, and with simulation analysis, the author proves the twitter- and SMS-control-based mobile botnet is superior with its invisibility, robustness and flexibility.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Wang, P., Sparks, S., Zou, C.: An Advanced Hybrid Peer-to-peer Botnet. In: Proc. USENIX HotBots 2007, p. 2 (2007)

    Google Scholar 

  2. Holz, T., Gorecki, C., Rieck, C., et al.: Detection and mitigation of fast-flux service networks. In: Proc. of the 15th Annual Network and Distributed System Security Symposium. USENIX, Berkeley (2008)

    Google Scholar 

  3. Stone-Gross, B., Cova, M., Cavallaro, L., et al.: Your botnet is my botnet; Analysis of a botnet takeover. In: Proc. of the 16th ACM Conf on Computer and Communications Security, pp. 635–647. ACM, New York (2009)

    Chapter  Google Scholar 

  4. Cui, X., Fang, B., Yin, L., et al.: Andbot: Towards advanced mobile botnets. In: Proc. of the 4th Usenix Workshop on Large-scale Exploits and Emergent Threats. USENIX, Berkeley (2011)

    Google Scholar 

  5. Geer, D.: Malicious bots threaten network security. Computer 38(1), 18–20 (2005)

    Article  MathSciNet  Google Scholar 

  6. Guo, W., Zhai, L., Guo, L., Shi, J.: Worm Propagation Control Based on Spatial Correlation in Wireless Sensor Network. In: Wang, H., Zou, L., Huang, G., He, J., Pang, C., Zhang, H.L., Zhao, D., Yi, Z. (eds.) APWeb 2012 Workshops. LNCS, vol. 7234, pp. 68–77. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  7. Brown, J., Shipman, B., Vetter, R.: SMS: The Short Message Service. Computer 40(12), 106–110 (2007)

    Article  Google Scholar 

  8. Boyd, D., Golder, S., Lotan, G.: Tweet, Tweet, Retweet: Conversational Aspects of Retweeting on Twitter. In: Proc. of 43rd Hawaii International Conference on System Sciences(HICSS), pp. 1–10 (2011)

    Google Scholar 

  9. Perera, R.D.W.: Twitter Analytics: Architecture, Tools and Analysis. In: Proc. of Conference on Military Communications, pp. 2186–2191 (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Li, Y., Zhai, L., Wang, Z., Ren, Y. (2013). Control Method of Twitter- and SMS-Based Mobile Botnet. In: Yuan, Y., Wu, X., Lu, Y. (eds) Trustworthy Computing and Services. ISCTCS 2012. Communications in Computer and Information Science, vol 320. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35795-4_81

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35795-4_81

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35794-7

  • Online ISBN: 978-3-642-35795-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics