CloudBot: Advanced mobile botnets using ubiquitous cloud technologies

被引:8
作者
Chen, Wei [1 ]
Luo, Xiapu [2 ,3 ]
Yin, Chengyu [1 ]
Xiao, Bin [2 ]
Au, Man Ho [2 ]
Tang, Yajuan [4 ]
机构
[1] Nanjing Univ Posts & Telecommun, Natl Engn Res Ctr Commun & Network Technol, Nanjing, Jiangsu, Peoples R China
[2] Hong Kong Polytech Univ, Dept Comp, Hong Kong, Hong Kong, Peoples R China
[3] Hong Kong Polytech Univ, Shenzhen Res Inst, Hong Kong, Hong Kong, Peoples R China
[4] Shantou Univ, Coll Engn, Shantou, Peoples R China
基金
中国国家自然科学基金;
关键词
Mobile botnet; Ubiquitous computing; Cloud; Command and control; ADVERSARY MODEL; IOS DEVICES; TAXONOMY; SERVICE;
D O I
10.1016/j.pmcj.2017.03.007
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The mobile botnet is a collection of compromised mobile devices that can remotely receive commands from the botmaster. Exploiting unique features of mobile networks and smartphones, mobile botnets pose a severe threat to mobile users, because smartphones have become an indispensable part of our daily lives and carried a lot of private information. With the development of cloud computing technologies, botmaster can utilize ubiquitous cloud technologies to construct robust and scalable C&C (command and control) channel for mobile botnet. In this paper, we propose Cloudbot, a novel mobile botnet, which outperforms existing mobile botnets in terms of robustness, controllability, scalability, and stealthiness. Although the basic idea of using cloud technologies seems straightforward, we explore the design space of exploiting such services and tackle several challenging issues to overcome the limitations of existing mobile botnets. We have implemented CloudBot by exploiting popular push services and cloud storage services, and evaluated it through extensive experiments. The results demonstrate not only the feasibility of CloudBot but also its advantages, such as stealthiness, robustness, and performance. (C) 2017 Elsevier B.V. All rights reserved.
引用
收藏
页码:270 / 285
页数:16
相关论文
共 38 条
[11]   A Markov adversary model to detect vulnerable iOS devices and vulnerabilities in iOS apps [J].
D'Orazio, Christian J. ;
Lu, Rongxing ;
Choo, Kim-Kwang Raymond ;
Vasilakos, Athanasios V. .
APPLIED MATHEMATICS AND COMPUTATION, 2017, 293 :523-544
[12]  
Do Q., 2016, SOFTW PRACT EXP
[13]   Exfiltrating data from Android devices [J].
Do, Quang ;
Martini, Ben ;
Choo, Kim-Kwang Raymond .
COMPUTERS & SECURITY, 2015, 48 :74-91
[14]  
Eslahi Meisam, 2014, 2014 IEEE Symposium on Wireless Technology and Applications (ISWTA), P199, DOI 10.1109/ISWTA.2014.6981187
[15]  
Gummadi K.P., 2002, P ACM IMC
[16]  
Handy MJ, 2002, P IEEE MWCN
[17]   Botnet command and control based on Short Message Service and human mobility [J].
Hua, Jingyu ;
Sakurai, Kouichi .
COMPUTER NETWORKS, 2013, 57 (02) :579-597
[18]   On cloud security attacks: A taxonomy and intrusion detection and prevention as a service [J].
Iqbal, Salman ;
Kiah, Laiha Mat ;
Dhaghighi, Babak ;
Hussain, Muzammil ;
Khan, Suleman ;
Khan, Muhammad Khurram ;
Choo, Kim-Kwang Raymond .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 74 :98-120
[19]   Cloud Attack and Risk Assessment Taxonomy [J].
Juliadotter, Nina Viktoria ;
Choo, Kim-Kwang Raymond .
IEEE CLOUD COMPUTING, 2015, 2 (01) :14-20
[20]  
Karim A, 2016, J UNIVERS COMPUT SCI, V22, P567