Cloud-based Mobile Botnets Using Multiple Push Servers

被引:2
作者
Chen, Wei [1 ]
Yin, Chengyu [1 ]
Zhou, Shiwen [1 ]
Yan, Xiaoshuang [1 ]
机构
[1] Nanjing Univ Posts & Telecommun, Coll Comp, Nanjing, Jiangsu, Peoples R China
来源
2015 SEVENTH INTERNATIONAL SYMPOSIUM ON PARALLEL ARCHITECTURES, ALGORITHMS AND PROGRAMMING (PAAP) | 2015年
关键词
botnet; cloud-based; push server; security; COMMAND;
D O I
10.1109/PAAP.2015.43
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the efficient Internet access and increasing powerful computing capabilities of mobile device, the mobile botnet has becoming an emerging threat in the mobile Internet. In this paper, we propose a novel mobile botnet using the cloud platform consisting with multiple message push servers. The path delay is measured as the metrics to classify bots into different groups. A weighted round-robin algorithm is implemented to select a push server to disseminate commands to each bot groups. With the push-styled command and control mechanism, the botmaster can enhance botnets stealthiness and controllability. Experimental results show that the multiple-push-styled botnet is stealthy and controllable in quickly delivering a command to all bots.
引用
收藏
页码:183 / 189
页数:7
相关论文
共 19 条
  • [1] Symbian worm Yxes: towards mobile botnets?
    Apvrille, Axelle
    [J]. JOURNAL IN COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2012, 8 (04): : 117 - 131
  • [2] Chen Wei, 2013, Wuhan University Journal of Natural Sciences, V18, P427, DOI 10.1007/s11859-013-0952-6
  • [3] Ester M., 1996, KDD-96 Proceedings. Second International Conference on Knowledge Discovery and Data Mining, P226
  • [4] Gu Guofei, 2008, P NDSS
  • [5] Gummadi KP, 2002, IMW 2002: PROCEEDINGS OF THE SECOND INTERNET MEASUREMENT WORKSHOP, P5, DOI 10.1145/637201.637203
  • [6] Hua JY, 2011, LECT NOTES COMPUT SC, V6633, P264, DOI 10.1007/978-3-642-21040-2_19
  • [7] Huang C., 2008, ACM IMC, V8
  • [8] Punobot: Mobile Botnet Using Push Notification Service in Android
    Lee, Hayoung
    Kang, Taeho
    Lee, Sangho
    Kim, Jong
    Kim, Yoonho
    [J]. INFORMATION SECURITY APPLICATIONS, WISA 2013, 2014, 8267 : 124 - 137
  • [9] Mulliner C., 2010, 2010 5th International Conference on Malicious and Unwanted Software (MALWARE 2010), P71, DOI 10.1109/MALWARE.2010.5665790
  • [10] Porras Phillip., 2010, Security and Privacy in Mobile Information and Communication Systems, volume 47 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, V47, P141, DOI DOI 10.1007/978-3-642-17502-2