New facets of mobile botnet: architecture and evaluation

被引:34
作者
Anagnostopoulos, Marios [1 ]
Kambourakis, Georgios [1 ]
Gritzalis, Stefanos [1 ]
机构
[1] Univ Aegean, Dept Informat & Commun Syst Engn, Info Sec Lab Lab Informat & Commun Syst Secur, Samos 83200, Greece
关键词
Mobile botnets; DNS amplification; Covert channel; Cyber security;
D O I
10.1007/s10207-015-0310-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
It is without a doubt that botnets pose a growing threat to the Internet, with DDoS attacks of any kind carried out by botnets to be on the rise. Nowadays, botmasters rely on advanced Command and Control (C&C) infrastructures to achieve their goals and most importantly to remain undetected. This work introduces two novel botnet architectures that consist only of mobile devices and evaluates both their impact in terms of DNS amplification and TCP flooding attacks, and their cost pertaining to the maintenance of the C&C channel. The first one puts forward the idea of using a continually changing mobile HTTP proxy in front of the botherder, while the other capitalizes on DNS protocol as a covert channel for coordinating the botnet. That is, for the latter, the messages exchanged among the bots and the herder appear as legitimate DNS transactions. Also, a third architecture is described and assessed, which is basically an optimized variation of the first one. Namely, it utilizes a mixed layout where all the attacking bots are mobile, but the proxy machines are typical PCs not involved in the actual attack. For the DNS amplification attack, which is by nature more powerful, we report an amplification factor that fluctuates between 32.7 and 34.1. Also, regarding the imposed C&C cost, we assert that it is minimal (about 0.25 Mbps) per bot in the worst case happening momentarily when the bot learns about the parameters of the attack.
引用
收藏
页码:455 / 473
页数:19
相关论文
共 42 条
[11]  
[Anonymous], S NETW DISTR SYST SE
[12]  
Antonakakis M., 2012, P 21 USENIX SEC S US, P491
[13]   Symbian worm Yxes: towards mobile botnets? [J].
Apvrille, Axelle .
JOURNAL IN COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2012, 8 (04) :117-131
[14]  
Dagon D., 2006, NDSS, V6, P2
[15]   User privacy and modern mobile services: are they on the same path? [J].
Damopoulos, D. ;
Kambourakis, G. ;
Anagnostopoulos, M. ;
Gritzalis, S. ;
Park, J. H. .
PERSONAL AND UBIQUITOUS COMPUTING, 2013, 17 (07) :1437-1448
[16]  
Debbabi M, 2014, INT CONF NEW TECHNOL, P1
[17]  
Eslahi M., 2012, 2012 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE), P262, DOI 10.1109/ISCAIE.2012.6482109
[18]  
Faghani M.R., 2012, 25th IEEE Canadian Conference on Electrical and Computer Engineering, P1
[19]  
Feizollah A, 2013, MALAYS J COMPUT SCI, V26, P251
[20]  
Felt A.P., 2011, P 1 ACM WORKSH SEC P, DOI DOI 10.1145/2046614.2046618