Evaluating Bluetooth As A Medium For Botnet Command And Control

DIMVA'10: Proceedings of the 7th international conference on Detection of intrusions and malware, and vulnerability assessment(2010)

引用 72|浏览32
暂无评分
摘要
Malware targeting mobile phones is being studied with increasing interest by the research community While such attention has previously focused on viruses and worms many of which use near-field communications in order to propagate, none have investigated whether more complex malware such as bot-nets can effectively operate in this environment In this paper, we investigate the challenges of constructing and maintaining mobile phone based bot-nets communicating nearly exclusively via Bluetooth Through extensive large scale simulation based on publicly available Bluetooth traces, we demonstrate that such a malicious infrastructure is possible in many areas due to the largely repetitive nature of human daily routines In particular we demonstrate that command and control messages can propagate to approximately 2/3 of infected nodes within 24 hours of being issued by the botmaster We then explore how traditional detense mechanisms can be modified to take advantage of the same information to more effectively mitigate such systems In so doing we demonstrate that mobile phone based botnets are a realistic threat and that defensive strategies should be modified to consider them
更多
查看译文
关键词
mobile phone-based botnets,mobile phone,available Bluetooth trace,control message,defensive strategy,extensive large-scale simulation,human daily routine,infected node,malicious infrastructure,near-field communication,botnet command
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要