An Exhaustive Comparison and Analysis of Botnet Attacks for Smartphones

Authors

  • Sonali Kothari Symbiosis Institute of Technology, Symbiosis International (Deemed University), Pune, India
  • Shubham Joshi Symbiosis Institute of Technology, Symbiosis International (Deemed University), Pune, India
  • Ishaan Tidke BVCOE, Lavale, Pune

Keywords:

Botnet, Mobile Security, Android Security, Command and Control Serve, Botnet Attack

Abstract

Different researchers have proposed different methods for designing botnet attacks using varying C & C channels. During earlier research in field of botnet, researchers worked on developing botnet attacks more than their detection. This helps in identifying methodologies employ for designing botnet attacks. With different communication methods, botnets were first designed for PCs. But with changing era researchers and cyber criminals are looking for methods for developing and understanding smartphone based botnet attack. Besides developing botnets for PCs and smartphones, researchers and security organizations are working for identification of different mobile phone botnet attacks. In the present article, study of existing literature is discussed to understand the history of botnet attacks and various methods evolved. The survey discusses different players of botnet attacks; different topologies evolved and various modes of propagation along with C&C channel. The chapter also includes practices and concepts of botnet attack, performance evaluation measures and databases used by various researchers. Literature survey also highlights some real botnet attacks used for commercial purpose or steal information using various platforms.

Downloads

Download data is not yet available.

References

M.O. Ogbomo and E. F. Ogbomo, “importance of information and communication technologies (icts) in making a healthy information society: a case study of ethiope east local government area of Delta state, Nigeria”, Journal on Library Philosophy and Practice, pp. 1-8, 2010.

K. Courville, “Technology and its use in education: present roles and future prospects”, 2011 Recovery School District Technology Summit, Current Trends and Recommendations in Technology, Baton Rouge, Louisiana, pp. 1-19, 2011.

L. Stosic, “The Importance of Educational Technology In Teaching”, International Journal of Cognitive Research in Science, Engineering and Education (IJCRSEE), vol. 3, no.1, pp. 111-114, 2015.

Milan Oulehla, “Investigation into Google Play security mechanisms via experimental botnet”, 2015 IEEE International Symposium Signal Processing and Information Technology (ISSPIT), Abu Dhabi, United Arab Emirates, pp. 591-596, December 2015.

Augusto Almeida Santos, Michele Nogueira, José M. F. Moura, “A stochastic adaptive model to explore mobile botnet dynamics”, IEEE Communications Letters, vol. 21, no. 4, pp.753-756, December 2016.

Lu, Z., Wang, W., & Wang, C, “On the evolution and impact of mobile botnets in wireless networks”, IEEE Transactions on Mobile Computing, vol. 15, no. 9, pp.2304-2316, 2016.

Ahmad Karim, Syed Adeel Ali Shah, Rosli Salleh, Muhammad Arif, Rafidah Md. Noor, Shahaboddin Shamshirband, “Mobile botnet attacks – an emerging threat: classification, review and open issues”, KSII Transactions on Internet and Information Systems, vol. 9, no. 4, pp.1471-1488, March 2015.

Qi, H., Shiraz M, Gani A, Whaiduzzaman M and Khan S, “Sierpinski triangle based data center architecture in cloud computing”, The Journal of Supercomputing, pp. 1-21, 2014.

Shuang Zhao, Patrick P. C. Lee, John C.s. Lui, Xiaohong Guan, Xiaobo Ma, Jing Tao,“Cloud-based push-styled mobile botnets: a case study of exploiting the cloud to device messaging service,” Proceedings of the 28th Annual Computer Security Applications Conference, December 2012.

Christian Szongott, Benjamin Henne, Matthew Smith, “Evaluating the threat of epidemic mobile malware,” 2012 IEEE 8th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Barcelona, Spain, December 2012.

Abdullah J. Alzahrani and Ali A. Ghorbani, “SMS-based mobile botnet detection framework using intelligent agents”, Journal of Cyber Security and Mobility, vol. 5, no. 2, pp.47-74, January 2017.

Yuanyuan Zeng, Xin Hu, Kang G. Shin, “How to Construct a Mobile Botnet?”, Article on Mobile Phones, pp. 1-2, 2010.

H. Pieterse, “Design of a hybrid command and control mobile botnet”, PhD. Thesis, Computer Science, University of Pretoria, July 2014.

Ashish Kundu, Zhiqiang Lin, Joshua Hammond, “Energy attacks on mobile devices”, ACM Journal, vol. 1, pp. 1-11, April 2017.

Rizwan Ahmed and Rajiv R. Dharasakar, “Study of mobile botnets: an analysis from the perspective of efficient generalized forensics framework for mobile devices”, National Conference on Innovative Paradigms in Engineering & Technology (NCIPET-2012), pp. 5-8, March 2012.

Georgios Mantas, Nikos Komninos, Jonathan Rodriguez, Evariste Logota, Hugo Marques, “Security for 5G Communications”, in Fundamentals of 5G Mobile Networks, John Wiley & Sons Ltd, pp. 207-220, May 2015.

Kalpna Midha, Kusum Rajawat, Vijay Singh Rathore, “An introduction to botnet attacks and it’s solutions”, International Journal of Computer Applications and Information Technology, vol. 1, issue 2, pp. 37-41, September 2012.

Adeeb Alhomoud, Irfan Awan, Jules Pagna Disso, “Towards an enterprise self-healing system against botnets attacks”, 2013 International Conference on Computing, Networking and Communications (ICNC), San Diego, CA, USA, January 2013.

Abdullahi Arabo and Bernardi Pranggono, “Mobile malware and smart device security: trends, challenges and solutions”, 19th International Conference on Control Systems and Computer Science, IEEE Computer Society, pp. 526-531, September 2013.

Jai Puneet Singh, Akashdeep Chauhan, “Detection and prevention of non-PC botnets”. [Online]. Available: http://vixra.org/pdf/1709.0402v1.pdf [Accessed August 17, 2023].

Ihsan Ullah, Naveed Khan and Hatim A. Aboalsamh, “Survey on botnet: its architecture, detection, prevention and mitigation”, IEEE Transactions, pp. 660 -665, 2013.

Guining Geng, Guoai Xu, Miao Zhang and Yanhui Guo, Guang Yang, Wei Cui, “The Design of SMS Based Heterogeneous Mobile Botnet”, Journal of Computers, vol. 7, issue 1, pp. 235-243, 2012.

Collin Mulliner, Jean-Pierre Seifert, “Rise of the iBots: Owning a telco network”, 2010 5th International Conference on Malicious and Unwanted Software, IEEE conferences, Nancy, Lorraine, France, pp. 71-80, October 2010.

Jingyu Hua and Kouichi Sakurai, “A SMS-based mobile botnet using flooding algorithm”, WISTP 2011: Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication, Springer, Berlin, Heidelberg, pp. 264-279, 2011.

“BlueJackig, BlueSnarfing and BlueBugging”, Techopedia. [Online]. Available: https://www.techopedia.com/definition/5046/ [Accessed 24 August 2023].

W. Xia, Z Li, Z Chen and Z Yuan, “Commwarrior worm propagation model for smart phone networks”, The Journal of China Universities of Posts and Telecommunications, vol. 15, no. 2, pp. 60-66, 2008.

D. Seenivasan and K. Shanthi, “Categories of botnet: A survey”, International Journal of Computer and Systems Engineering, vol. 8, no.9, pp.1689-1692, 2014.

Payal Chandak, H. P. Channe, “Design and detection of social media botnets using event-driven analysis”, International Journal of Innovative Research in Computer and Communication Engineering, vol. 5, issue 5, pp.10094-10097, May 2017.

“Hashtag hijacking: the good, the bad, and the ugly”, AgencySparks, November 10, 2016. [Online]. Available: https://www.agencysparks.com/blog/hashtag-hijacking [Accessed August 24, 2023]

Reham A. Al-Dayil, & Mostafa H. Dahshan, “Detecting social media mobile botnets using user activity correlation and artificial immune system”, 2016 7th International Conference on Information and Communication Systems (ICICS), IEEE Conference, Irbid, Jordan pp. 109-114, April 2016.

J. Vagheshwari and S. Swarndeep, “Detecting bot messages from social media using language match algorithm”, International Journal of Advance Research and Innovation Ideas in Education (IJARIIE), vol. 3, issue 2, 2017.

“Bluetooth-Worm:SymbOS/Cabir”, FSecure [Online]. Available: https://www.f-secure.com/v-descs/cabir.shtml [Accessed: June 14, 2023]

Usman Sarwar, Sureswaran Ramadass, Rahmat Budiarto, “A framework for detecting Bluetooth mobile worms”, 2007 IEEE International Conference on Telecommunications and Malaysia International Conference on Communications, Penang, Malaysia, pp.343-347, May 2007.

“Zeus Trojan (Zbot)”, TechTarget SearchSecurity, May 2012. [Online]. Available: https://searchsecurity.techtarget.com/definition/Zeus-Trojan-Zbot [Accessed June 14,2023]

“Proofpoint Uncovers Internet of Things (IoT) Cyberattack”, Proofpoint, January 16, 2014. [Online]. Available: https://www.proofpoint.com/us/proofpoint-uncovers-internet-things-iot-cyberattack [Accessed June 14, 2023]

Swati Khandelwal, “Pre-installed malware found on 5 million popular Android phones”, The Hacker News, March 15, 2015. [Online]. Available: https://thehackernews.com/2018/03/android-botnet-malware.html [Accessed June 14, 2023]

“Top 5 botnets of 2017”, PentaSecurity, December 22, 2017. [Online]. Available: https://www.pentasecurity.com/blog/top-5-botnets-2017/ [Accessed June 14, 2023]

Mohit Kumar, “WireX DDoS botnet: an army of thousands of hacked Android smartphones”, The Hacker News, August 28, 2017. [Online]. Available: https://thehackernews.com/2017/08/android-ddos-botnet.html [Accessed June 06, 2023]

Josh Fruhlinger, “The Mirai botnet explained: how teen scammers and CCTV cameras almost brought down the internet”, CSO from IDG March 9, 2018. [Online]. Available: https://www.csoonline.com/article/3258748/security/the-mirai-botnet-explained-how-teen-scammers-and-cctv-cameras-almost-brought-down-the-internet.html [Accessed June 14, 2023]

Brandon Vigliarolo, “Google stops the spread of Tizi Android malware in the Play Store”, TechRepublic, November 28, 2017. [Online]. Available: https://www. techrepublic.com/article/google-stops-the-spread-of-tizi-android-malware-in-the-play-store/ [Accessed June 14, 2023]

McAfee Labs Threats Report, June 2018, [Online]. Available: https://www.mcafee.com/enterprise/en-us/assets/reports/rp-quarterly-threats-jun-2018.pdf [Accessed June 14, 2023]

Milan Oulehla, “Investigation into Google Play security mechanisms via experimental botnet”, 2015 IEEE International Symposium Signal Processing and Information Technology (ISSPIT), Abu Dhabi, United Arab Emirates, pp. 591-596, December 2015.

Khodor Hamandi,Imad H. Elhajj, Ali Chehab, Ayman Kayssi, “Android SMS botnet: A new perspective”, 10th ACM International Symposium on Mobility Management and Wireless Access, pp. 1-6, October 2012.

Kapil Singh, Samrit Sangal, Nehil Jain, Patrick Traynor and Wenke Lee, “Evaluating Bluetooth as a medium for botnet command and control”, DIMVA 2010: Detection of Intrusions and Malware, and Vulnerability Assessment, Springer–Verlog, Berlin, Heidelberg, pp. 61-80, 2010.

Mohammad Reza Faghani, Uyen Trang Nguyen, “Socellbot: A new botnet design to infect smartphones via online social networking”, 2012 25th IEEE Canadian Conference on Electrical & Computer Engineering (CCECE), Montreal, QC, Canada, pp. 1-5, May 2012.

Heloise Pieterse and Martin S. Olivier, “Bluetooth command and control channel”, Computers & Security, pp. 75-83, May 2014.

Ping Wang, Lei Wu, Ryan Cunningham, Cliff C. Zou, “Honeypot detection in advanced botnet attacks”, International Journal on Information and Computer Security, Inderscience Enterprises Ltd., vol. 4, issue 1, pp. 30-51, January 2010.

Shuang Zhao, Patrick P.C. Lee, John C.S. Lui, Xiaohong Guan, Xiaobo Ma, Jing Tao, “Cloud-based push-styled mobile botnets: A case study of exploiting the cloud to device messaging service”, ACSAC '12 Proceedings of the 28th Annual Computer Security Applications Conference, Orlando, Florida, USA, pp. 119 – 128, December 2012.

Downloads

Published

25.12.2023

How to Cite

Kothari, S. ., Joshi, S. ., & Tidke, I. . (2023). An Exhaustive Comparison and Analysis of Botnet Attacks for Smartphones. International Journal of Intelligent Systems and Applications in Engineering, 12(2), 599–619. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/4304

Issue

Section

Research Article