CloudBot: Advanced mobile botnets using ubiquitous cloud technologies
Autor: | Bin Xiao, Xiapu Luo, Chengyu Yin, Yajuan Tang, Wei Chen, Man Ho Allen Au |
---|---|
Rok vydání: | 2017 |
Předmět: |
021110 strategic
defence & security studies Ubiquitous computing Computer Networks and Communications business.industry Computer science 0211 other engineering and technologies Mobile computing Botnet 020206 networking & telecommunications Cloud computing Mobile Web 02 engineering and technology Computer security computer.software_genre Computer Science Applications Hardware and Architecture 0202 electrical engineering electronic engineering information engineering Mobile search business Mobile device computer Cloud storage Software Information Systems Computer network |
Zdroj: | Pervasive and Mobile Computing. 41:270-285 |
ISSN: | 1574-1192 |
DOI: | 10.1016/j.pmcj.2017.03.007 |
Popis: | The mobile botnet is a collection of compromised mobile devices that can remotely receive commands from the botmaster. Exploiting unique features of mobile networks and smartphones, mobile botnets pose a severe threat to mobile users, because smartphones have become an indispensable part of our daily lives and carried a lot of private information. With the development of cloud computing technologies, botmaster can utilize ubiquitous cloud technologies to construct robust and scalable C&C (command and control) channel for mobile botnet. In this paper, we propose Cloudbot, a novel mobile botnet, which outperforms existing mobile botnets in terms of robustness, controllability, scalability, and stealthiness. Although the basic idea of using cloud technologies seems straightforward, we explore the design space of exploiting such services and tackle several challenging issues to overcome the limitations of existing mobile botnets. We have implemented CloudBot by exploiting popular push services and cloud storage services, and evaluated it through extensive experiments. The results demonstrate not only the feasibility of CloudBot but also its advantages, such as stealthiness, robustness, and performance. |
Databáze: | OpenAIRE |
Externí odkaz: |