Abstract
The rapid development of 3G/WiFi network and Smartphone has greatly stimulated the evolution of mobile botnets. Mobile botnets have attracted extensive attentions from the academic community. In this paper, we introduce our design of an advanced mobile botnet called SUbot which exploits a novel command and control (C&C) strategy named Shorten-URL Flux (short for S-URL Flux). The proposed SUbot would have desirable features including being stealthy, resilient and low-cost (i.e., low battery power consumption, low traffic consumption and low money cost).This paper focuses on the design principle of the mobile botnet. In comparison to traditional mobile botnet, SUbot has stronger adaptability and stability. It’s of great significance to research and defend against such kind of advance mobile botnet.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Cui, X., Fang, B., Yin, L., Liu, X.: Andbot: Towards Advanced Mobile Botnets. In: Proc. of the 4th USENIX Workshop on Large-scale Exploits and Emergent Threats (LEET 2011) (2011)
Apvrille, A.: Symbian worm Yxes Towards mobile botnets, http://www.fortiguard.com/papers/EICAR2010_Symbian-Yxes_Towards-Mobile-Botnets.pdf
Porras, P.A., Saidi, H., Yegneswaran, V.: An Analysis of the iKee.B iPhone Botnet. In: Proceedings of the 2nd International ICST Conference on Security and Privacy on Mobile Information and Communications Systems (May 2010)
Mulliner, C.: Fuzzing the Phone in your Phone, http://www.mulliner.org/security/sms/feed/smsfuzz_26c3.pdf
Mulliner, C., SeifertIn, J.P.: Rise of the iBots: 0wning a telco network. In: The Proceedings of the 5th IEEE International Conference on Malicious and Unwanted Software (Malware)Nancy, France, October 19-20 (2010)
Wang, P., Sparks, S., et al.: An advanced hybrid peer to peer botnet. In: Proc. of the HotBots 2007, First Workshop on Hot Topics in Understanding Botnets, Cambridge, MA (2007)
Singh, K., Sangal, S., Jain, N., Traynor, P., Lee, W.: Evaluating Bluetooth as a Medium for Botnet Command and Control. In: Kreibich, C., Jahnke, M. (eds.) DIMVA 2010. LNCS, vol. 6201, pp. 61–80. Springer, Heidelberg (2010)
Mulliner, C.: Fuzzing the Phone in your Phone, http://www.mulliner.org/security/sms/feed/smsfuzz_26c3.pdf
Traynor, P., Lin, M., Ongtang, M., Rao, V., Jaeger, T., La Porta, T., McDaniel, P.: On Cellular Botnets:Measuring the Impact of Malicious Devices on a Cellular Network Core. In: ACM Conference on Computer and Communications Security (CCS) (November 2009)
Nash, D.C., Martin, T.L., Ha, D.S., Hsiao, M.S.: Towards an intrusion detection system for battery exhaustion attacks on mobile computing devices. In: Proceedings of the Third IEEEInternational Conference on Pervasive Computing and Communications Workshops, PERCOMW 2005, pp. 141–145. IEEE Computer Society, Washington, DC (2005)
Kim, H., Smith, J., Shin, K.G.: Detecting energygreedy anomalies and mobile malware variants. In: MobiSys (2008)
Davis, N.: Battery-based intrusion detection. In: Proceedings of the Global Telecommunications Conference (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Shuai, W., Xiang, C., Peng, L., Dan, L. (2013). S-URL Flux: A Novel C&C Protocol for Mobile Botnets. In: Yuan, Y., Wu, X., Lu, Y. (eds) Trustworthy Computing and Services. ISCTCS 2012. Communications in Computer and Information Science, vol 320. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35795-4_52
Download citation
DOI: https://doi.org/10.1007/978-3-642-35795-4_52
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35794-7
Online ISBN: 978-3-642-35795-4
eBook Packages: Computer ScienceComputer Science (R0)