Skip to main content

S-URL Flux: A Novel C&C Protocol for Mobile Botnets

  • Conference paper
Trustworthy Computing and Services (ISCTCS 2012)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 320))

Included in the following conference series:

Abstract

The rapid development of 3G/WiFi network and Smartphone has greatly stimulated the evolution of mobile botnets. Mobile botnets have attracted extensive attentions from the academic community. In this paper, we introduce our design of an advanced mobile botnet called SUbot which exploits a novel command and control (C&C) strategy named Shorten-URL Flux (short for S-URL Flux). The proposed SUbot would have desirable features including being stealthy, resilient and low-cost (i.e., low battery power consumption, low traffic consumption and low money cost).This paper focuses on the design principle of the mobile botnet. In comparison to traditional mobile botnet, SUbot has stronger adaptability and stability. It’s of great significance to research and defend against such kind of advance mobile botnet.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Cui, X., Fang, B., Yin, L., Liu, X.: Andbot: Towards Advanced Mobile Botnets. In: Proc. of the 4th USENIX Workshop on Large-scale Exploits and Emergent Threats (LEET 2011) (2011)

    Google Scholar 

  2. Apvrille, A.: Symbian worm Yxes Towards mobile botnets, http://www.fortiguard.com/papers/EICAR2010_Symbian-Yxes_Towards-Mobile-Botnets.pdf

  3. Porras, P.A., Saidi, H., Yegneswaran, V.: An Analysis of the iKee.B iPhone Botnet. In: Proceedings of the 2nd International ICST Conference on Security and Privacy on Mobile Information and Communications Systems (May 2010)

    Google Scholar 

  4. Mulliner, C.: Fuzzing the Phone in your Phone, http://www.mulliner.org/security/sms/feed/smsfuzz_26c3.pdf

  5. Mulliner, C., SeifertIn, J.P.: Rise of the iBots: 0wning a telco network. In: The Proceedings of the 5th IEEE International Conference on Malicious and Unwanted Software (Malware)Nancy, France, October 19-20 (2010)

    Google Scholar 

  6. Wang, P., Sparks, S., et al.: An advanced hybrid peer to peer botnet. In: Proc. of the HotBots 2007, First Workshop on Hot Topics in Understanding Botnets, Cambridge, MA (2007)

    Google Scholar 

  7. Singh, K., Sangal, S., Jain, N., Traynor, P., Lee, W.: Evaluating Bluetooth as a Medium for Botnet Command and Control. In: Kreibich, C., Jahnke, M. (eds.) DIMVA 2010. LNCS, vol. 6201, pp. 61–80. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  8. Mulliner, C.: Fuzzing the Phone in your Phone, http://www.mulliner.org/security/sms/feed/smsfuzz_26c3.pdf

  9. Traynor, P., Lin, M., Ongtang, M., Rao, V., Jaeger, T., La Porta, T., McDaniel, P.: On Cellular Botnets:Measuring the Impact of Malicious Devices on a Cellular Network Core. In: ACM Conference on Computer and Communications Security (CCS) (November 2009)

    Google Scholar 

  10. Nash, D.C., Martin, T.L., Ha, D.S., Hsiao, M.S.: Towards an intrusion detection system for battery exhaustion attacks on mobile computing devices. In: Proceedings of the Third IEEEInternational Conference on Pervasive Computing and Communications Workshops, PERCOMW 2005, pp. 141–145. IEEE Computer Society, Washington, DC (2005)

    Chapter  Google Scholar 

  11. Kim, H., Smith, J., Shin, K.G.: Detecting energygreedy anomalies and mobile malware variants. In: MobiSys (2008)

    Google Scholar 

  12. Davis, N.: Battery-based intrusion detection. In: Proceedings of the Global Telecommunications Conference (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Shuai, W., Xiang, C., Peng, L., Dan, L. (2013). S-URL Flux: A Novel C&C Protocol for Mobile Botnets. In: Yuan, Y., Wu, X., Lu, Y. (eds) Trustworthy Computing and Services. ISCTCS 2012. Communications in Computer and Information Science, vol 320. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35795-4_52

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35795-4_52

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35794-7

  • Online ISBN: 978-3-642-35795-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics