New facets of mobile botnet: architecture and evaluation

被引:34
作者
Anagnostopoulos, Marios [1 ]
Kambourakis, Georgios [1 ]
Gritzalis, Stefanos [1 ]
机构
[1] Univ Aegean, Dept Informat & Commun Syst Engn, Info Sec Lab Lab Informat & Commun Syst Secur, Samos 83200, Greece
关键词
Mobile botnets; DNS amplification; Covert channel; Cyber security;
D O I
10.1007/s10207-015-0310-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
It is without a doubt that botnets pose a growing threat to the Internet, with DDoS attacks of any kind carried out by botnets to be on the rise. Nowadays, botmasters rely on advanced Command and Control (C&C) infrastructures to achieve their goals and most importantly to remain undetected. This work introduces two novel botnet architectures that consist only of mobile devices and evaluates both their impact in terms of DNS amplification and TCP flooding attacks, and their cost pertaining to the maintenance of the C&C channel. The first one puts forward the idea of using a continually changing mobile HTTP proxy in front of the botherder, while the other capitalizes on DNS protocol as a covert channel for coordinating the botnet. That is, for the latter, the messages exchanged among the bots and the herder appear as legitimate DNS transactions. Also, a third architecture is described and assessed, which is basically an optimized variation of the first one. Namely, it utilizes a mixed layout where all the attacking bots are mobile, but the proxy machines are typical PCs not involved in the actual attack. For the DNS amplification attack, which is by nature more powerful, we report an amplification factor that fluctuates between 32.7 and 34.1. Also, regarding the imposed C&C cost, we assert that it is minimal (about 0.25 Mbps) per bot in the worst case happening momentarily when the bot learns about the parameters of the attack.
引用
收藏
页码:455 / 473
页数:19
相关论文
共 42 条
[1]   DNS amplification attack revisited [J].
Anagnostopoulos, Marios ;
Kambourakis, Georgios ;
Kopanos, Panagiotis ;
Louloudakis, Georgios ;
Gritzalis, Stefanos .
COMPUTERS & SECURITY, 2013, 39 :475-485
[2]  
[Anonymous], IEEE 5 CONTR SYST GR
[3]  
[Anonymous], 2011, 2011 7 EUR C COMP NE
[4]  
[Anonymous], 2008, BOTMINER CLUSTERING
[5]  
[Anonymous], 4035 RFC
[6]  
[Anonymous], P 7 EUR WORKSH SYST
[7]  
[Anonymous], 2011, Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices
[8]  
[Anonymous], 2008, USENIX SEC S
[9]  
[Anonymous], 4033 RFC
[10]  
[Anonymous], 4034 RFC