Abstract
The rapid development of mobile Internet provides conditions for traditional botnets to spread to mobile Internet. Combined with the development tendency of mobile botnet, this paper presents an Android-based mobile botnet model from the perspective of an attacker. In this model, we adopt the social engineering means as the main route of propagation of bots and build a C&C (Command and Control) Channel based on SMS-HTTP protocol and a centralized-structured topology. In addition, we design an intelligent bot model to improve the robustness of the whole botnet and implement it on Android System. In the end we discuss the corresponding defense against the botnet.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Apvrille, A.: Symbian worm Yxes: towards mobile botnets. J. Comput. Virol. 8(4), 117–131 (2012)
Porras, Phillip, Saïdi, Hassen, Yegneswaran, Vinod: An analysis of the iKee.B iPhone botnet. In: Schmidt, Andreas U., Russello, Giovanni, Lioy, Antonio, Prasad, Neeli R., Lian, Shiguo (eds.) MobiSec 2010. LNICST, vol. 47, pp. 141–152. Springer, Heidelberg (2010)
Wyatt, T.: Security alert: geinimi, sophisticated new android Trojan found in wild. Blog, Dec 2010
Felt, A.P., Finifter, M., Chin, E., et al.: A survey of mobile malware in the wild. In: Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices, pp. 3–14. ACM (2011)
Schmidt, A.D., Schmidt, H.G., Batyuk, L., et al.: Smartphone malware evolution revisited: android next target? In: 2009 4th International Conference on Malicious and Unwanted Software (MALWARE), pp. 1–7. IEEE (2009)
Mulliner, C., Seifert, J.P.: Rise of the iBots: owning a telco network. In: 2010 5th International Conference on Malicious and Unwanted Software (MALWARE), pp. 71–80. IEEE (2010)
Zeng, Y., Shin, K.G., Hu, X.: Design of SMS commanded-and-controlled and P2P-structured mobile botnets. In: Proceedings of the 5th ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 137–148. ACM (2012)
Singh, Kapil, Sangal, Samrit, Jain, Nehil, Traynor, Patrick, Lee, Wenke: Evaluating bluetooth as a medium for botnet command and control. In: Kreibich, Christian, Jahnke, Marko (eds.) DIMVA 2010. LNCS, vol. 6201, pp. 61–80. Springer, Heidelberg (2010)
Xiang, C., Binxing, F., Lihua, Y., Xiaoyi, L., Tianning, Z.: Andbot: towards advanced mobile botnets. In: Proceedings of the 4th USENIX Conference on Large-scale Exploits and Emergent Threats, pp. 11–11. USENIX Association (2011)
Geng, G., Chen, D., Gao, H., Zhang, M., Yang, G.: Design and analyze of mobile botnets. J. Tsinghua Univ. Nat. Sci. 51(10), 1329–1334 (2011)
Xiaoyi, L., Xiang, C., Donghua, Z., et al.: A mobile botnet based on android System. Comput. Eng. 37(22) (2011). doi:10.3969/j.issn.1000-3428.2011.22.001.
Yue, L., Lidong, Z., Hongxia, W., et al.: A mobile botnet based on social network. Comput. Res. Dev. 49(Suppl.), 1–8 (2012)
Binxing, F., Xiang, C., Wei, W.: Overview of botnet. Comput. Res. Dev. 48(8), 1315–1331 (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wang, P., Zhang, C., Li, X., Zhang, C. (2014). A Mobile Botnet Model Based on Android System. In: Yuan, Y., Wu, X., Lu, Y. (eds) Trustworthy Computing and Services. ISCTCS 2013. Communications in Computer and Information Science, vol 426. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-43908-1_7
Download citation
DOI: https://doi.org/10.1007/978-3-662-43908-1_7
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-43907-4
Online ISBN: 978-3-662-43908-1
eBook Packages: Computer ScienceComputer Science (R0)