CloudBot: Advanced mobile botnets using ubiquitous cloud technologies

被引:8
作者
Chen, Wei [1 ]
Luo, Xiapu [2 ,3 ]
Yin, Chengyu [1 ]
Xiao, Bin [2 ]
Au, Man Ho [2 ]
Tang, Yajuan [4 ]
机构
[1] Nanjing Univ Posts & Telecommun, Natl Engn Res Ctr Commun & Network Technol, Nanjing, Jiangsu, Peoples R China
[2] Hong Kong Polytech Univ, Dept Comp, Hong Kong, Hong Kong, Peoples R China
[3] Hong Kong Polytech Univ, Shenzhen Res Inst, Hong Kong, Hong Kong, Peoples R China
[4] Shantou Univ, Coll Engn, Shantou, Peoples R China
基金
中国国家自然科学基金;
关键词
Mobile botnet; Ubiquitous computing; Cloud; Command and control; ADVERSARY MODEL; IOS DEVICES; TAXONOMY; SERVICE;
D O I
10.1016/j.pmcj.2017.03.007
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The mobile botnet is a collection of compromised mobile devices that can remotely receive commands from the botmaster. Exploiting unique features of mobile networks and smartphones, mobile botnets pose a severe threat to mobile users, because smartphones have become an indispensable part of our daily lives and carried a lot of private information. With the development of cloud computing technologies, botmaster can utilize ubiquitous cloud technologies to construct robust and scalable C&C (command and control) channel for mobile botnet. In this paper, we propose Cloudbot, a novel mobile botnet, which outperforms existing mobile botnets in terms of robustness, controllability, scalability, and stealthiness. Although the basic idea of using cloud technologies seems straightforward, we explore the design space of exploiting such services and tackle several challenging issues to overcome the limitations of existing mobile botnets. We have implemented CloudBot by exploiting popular push services and cloud storage services, and evaluated it through extensive experiments. The results demonstrate not only the feasibility of CloudBot but also its advantages, such as stealthiness, robustness, and performance. (C) 2017 Elsevier B.V. All rights reserved.
引用
收藏
页码:270 / 285
页数:16
相关论文
共 38 条
[1]  
Anagnostou ME, 2015, IEEE EUROCON 2015 - INTERNATIONAL CONFERENCE ON COMPUTER AS A TOOL (EUROCON), P1
[2]  
[Anonymous], 2016, FOCI 2016
[3]  
[Anonymous], DATA EXFILTRATION IN
[4]  
[Anonymous], FUTURE GENER COMPUT
[5]  
[Anonymous], P IEEE S SEC PRIV
[6]  
Chen W., 2016, P ACISP
[7]   Cloud-based Mobile Botnets Using Multiple Push Servers [J].
Chen, Wei ;
Yin, Chengyu ;
Zhou, Shiwen ;
Yan, Xiaoshuang .
2015 SEVENTH INTERNATIONAL SYMPOSIUM ON PARALLEL ARCHITECTURES, ALGORITHMS AND PROGRAMMING (PAAP), 2015, :183-189
[8]  
Cui X., 2012, P CCS
[9]  
Cui X., 2011, P LEET
[10]   An adversary model to evaluate DRM protection of video contents on iOS devices [J].
D'Orazio, Christian ;
Choo, Kim-Kwang Raymond .
COMPUTERS & SECURITY, 2016, 56 :94-110