Netinfo Security ›› 2015, Vol. 15 ›› Issue (4): 19-27.doi: 10.3969/j.issn.1671-1122.2015.04.004

Previous Articles     Next Articles

Survey of Mobile Botnet

LI Na1,2(), DU Yan-hui1, GAO Feng3   

  1. 1.School of Cyber Security Defense, Public Security University of China, Beijing 100038,China
    2. Command Center, Lu Nan Sub-Bureau of Tangshan Municipal Public Security Bureau, Tangshan Hebei 063000, China
    3. Integrated Department of Principal's Office, Hebei United University, Tangshan Hebei 063000, China
  • Received:2015-01-21 Online:2015-04-10 Published:2018-07-16

Abstract:

With the popularity of smart devices and the rapid development of 4G technology, the living environment of mobile botnet has been ripe. Mobile botnet has made great damages to infrastructural facilities and property of people. But current security solutions for smart phones and mobile devices are very limited in preventing those attacks. So mobile botnet has become one of the important security problems of the mobile network. Mobile botnet has a close relationship to mobile malware, because construction of mobile botnet dependents on the propagation of mobile malware. This paper first introduces the evolution process of mobile malware. The important part of a botnet construction is the command and control (C&C) channel which is the key point for both the attacker and defender for mobile network control. The mobile botnet is different than the traditional botnet in command and control channel design. Command and control channel is also a mainly sign which is the mobile botnet be distinguish from mobile malware. In order to understand the current research works and the evolution process of mobile botnet, the command and control mechanisms of mobile botnet are discussed. The situation of the command and control based on SMS, Bluetooth, HTTP, Web 2.0 and others researches are analyzed and compared. And the different kinds of propagation of mobile botnet are further more discussed. In this part, to understand the propagation behavior of mobile botnets, many propagation models of mobile botnet as a foundation for further exploration. Those propagation models include deterministic epidemic models, stochastic models and spatialtemporal models. To study the mobile botnet is to connect with the simulator of mobile botnet. Mathematical models simulator, event-based simulator, trace-driven simulator and agent-based simulator of mobile botnet are reviewed. At last, the defense policies of mobile botnet are proposed. The defense policies can help defenders develop defense strategies or make prevention policy to block the propagation of the moblie botnet. And it is important and practical significance for protecting mobile network security and attacking mobile network crime. So the study mobile botnet is very valuable to provide a workable solution to enhance the defense ability of mobile network.

Key words: mobile botnet, command and control channel, propagation model, simulator

CLC Number: