Skip to main content

A Mobile Botnet Model Based on Android System

  • Conference paper
  • First Online:
Book cover Trustworthy Computing and Services (ISCTCS 2013)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 426))

Included in the following conference series:

Abstract

The rapid development of mobile Internet provides conditions for traditional botnets to spread to mobile Internet. Combined with the development tendency of mobile botnet, this paper presents an Android-based mobile botnet model from the perspective of an attacker. In this model, we adopt the social engineering means as the main route of propagation of bots and build a C&C (Command and Control) Channel based on SMS-HTTP protocol and a centralized-structured topology. In addition, we design an intelligent bot model to improve the robustness of the whole botnet and implement it on Android System. In the end we discuss the corresponding defense against the botnet.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Apvrille, A.: Symbian worm Yxes: towards mobile botnets. J. Comput. Virol. 8(4), 117–131 (2012)

    Article  Google Scholar 

  2. Porras, Phillip, Saïdi, Hassen, Yegneswaran, Vinod: An analysis of the iKee.B iPhone botnet. In: Schmidt, Andreas U., Russello, Giovanni, Lioy, Antonio, Prasad, Neeli R., Lian, Shiguo (eds.) MobiSec 2010. LNICST, vol. 47, pp. 141–152. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  3. Wyatt, T.: Security alert: geinimi, sophisticated new android Trojan found in wild. Blog, Dec 2010

    Google Scholar 

  4. Felt, A.P., Finifter, M., Chin, E., et al.: A survey of mobile malware in the wild. In: Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices, pp. 3–14. ACM (2011)

    Google Scholar 

  5. Schmidt, A.D., Schmidt, H.G., Batyuk, L., et al.: Smartphone malware evolution revisited: android next target? In: 2009 4th International Conference on Malicious and Unwanted Software (MALWARE), pp. 1–7. IEEE (2009)

    Google Scholar 

  6. Mulliner, C., Seifert, J.P.: Rise of the iBots: owning a telco network. In: 2010 5th International Conference on Malicious and Unwanted Software (MALWARE), pp. 71–80. IEEE (2010)

    Google Scholar 

  7. Zeng, Y., Shin, K.G., Hu, X.: Design of SMS commanded-and-controlled and P2P-structured mobile botnets. In: Proceedings of the 5th ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 137–148. ACM (2012)

    Google Scholar 

  8. Singh, Kapil, Sangal, Samrit, Jain, Nehil, Traynor, Patrick, Lee, Wenke: Evaluating bluetooth as a medium for botnet command and control. In: Kreibich, Christian, Jahnke, Marko (eds.) DIMVA 2010. LNCS, vol. 6201, pp. 61–80. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  9. Xiang, C., Binxing, F., Lihua, Y., Xiaoyi, L., Tianning, Z.: Andbot: towards advanced mobile botnets. In: Proceedings of the 4th USENIX Conference on Large-scale Exploits and Emergent Threats, pp. 11–11. USENIX Association (2011)

    Google Scholar 

  10. Geng, G., Chen, D., Gao, H., Zhang, M., Yang, G.: Design and analyze of mobile botnets. J. Tsinghua Univ. Nat. Sci. 51(10), 1329–1334 (2011)

    Google Scholar 

  11. Xiaoyi, L., Xiang, C., Donghua, Z., et al.: A mobile botnet based on android System. Comput. Eng. 37(22) (2011). doi:10.3969/j.issn.1000-3428.2011.22.001.

  12. Yue, L., Lidong, Z., Hongxia, W., et al.: A mobile botnet based on social network. Comput. Res. Dev. 49(Suppl.), 1–8 (2012)

    Google Scholar 

  13. Binxing, F., Xiang, C., Wei, W.: Overview of botnet. Comput. Res. Dev. 48(8), 1315–1331 (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Peng Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wang, P., Zhang, C., Li, X., Zhang, C. (2014). A Mobile Botnet Model Based on Android System. In: Yuan, Y., Wu, X., Lu, Y. (eds) Trustworthy Computing and Services. ISCTCS 2013. Communications in Computer and Information Science, vol 426. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-43908-1_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-43908-1_7

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-43907-4

  • Online ISBN: 978-3-662-43908-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics