Netinfo Security ›› 2018, Vol. 18 ›› Issue (7): 16-28.doi: 10.3969/j.issn.1671-1122.2018.07.003

• Orginal Article • Previous Articles     Next Articles

Research on Ubiquitous Botnet

Di WU1,2, Xiang CUI1,3, Qixu LIU1,2(), Fangjiao ZHAGN1,2   

  1. 1. Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China
    2. School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China
    3. Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou Guangdong 510006, China
  • Received:2018-03-15 Online:2018-07-15 Published:2020-05-11

Abstract:

The current devices in ubiquitous network are in the early stage of intelligence, resulting in many security issues. In addition, the universally low security consciousness among users and the connectivity of ubiquitous network provide a huge space for malicious codes’ survival, propagation and development. Botnet is one of the most effective attack platforms. However, as the forms and command and control mechanisms change in the ubiquitous network environment, there are new challenges to defenders. This paper, on the basis of making clear the features of ubiquitous network environment, gives the formal definition of ubiquitous botnet, and makes a comprehensive introduction of the mechanism, build process and core technology. Moreover, the paper divides the development of ubiquitous botnet into three stages in chronological order, namely, attacks to PC, attacks to phone and extensive attacks, and analyzes the technical details from spreading infection, survival ability and control management. After a summary of the present defensive countermeasures, possible future attempts are presented.

Key words: ubiquitous network, botnet, command and control channel (C&C channel);

CLC Number: