TY - GEN
T1 - Muse: Towards robust and stealthy mobile botnets via multiple message push services
AU - Chen, Wei
AU - Luo, Xiapu
AU - Yin, Chengyu
AU - Xiao, Bin
AU - Au, Man Ho Allen
AU - Tang, Yajuan
PY - 2016/1/1
Y1 - 2016/1/1
N2 - Exploiting unique features in mobile networks and smartphones, mobile botnets pose a severe threat to mobile users, because smartphones have become an indispensable part of our daily lives and carried a lot of private information. However, existing mobile botnets usually rely on a single command and control channel (e.g., a push server or an SMS server) to disseminate commands, which can become the bottleneck or a single point of failure, without considering the robustness. In this paper, we propose MUSE, a novel multiple push service-based botnet, which can significantly outperform existing push-styled mobile botnets in terms of robustness, controllability, scalability, and stealthiness. Although the basic idea of using multiple push services seems straightforward, we explore the design space of exploiting such services and tackle several challenging issues to overcome the limitations of existing push-styled mobile botnets. We have implemented MUSE by exploiting ten popular push services and evaluated it through extensive experiments. The results demonstrate not only MUSE’s feasibility but also its advantages, such as stealthiness, controllability etc.
AB - Exploiting unique features in mobile networks and smartphones, mobile botnets pose a severe threat to mobile users, because smartphones have become an indispensable part of our daily lives and carried a lot of private information. However, existing mobile botnets usually rely on a single command and control channel (e.g., a push server or an SMS server) to disseminate commands, which can become the bottleneck or a single point of failure, without considering the robustness. In this paper, we propose MUSE, a novel multiple push service-based botnet, which can significantly outperform existing push-styled mobile botnets in terms of robustness, controllability, scalability, and stealthiness. Although the basic idea of using multiple push services seems straightforward, we explore the design space of exploiting such services and tackle several challenging issues to overcome the limitations of existing push-styled mobile botnets. We have implemented MUSE by exploiting ten popular push services and evaluated it through extensive experiments. The results demonstrate not only MUSE’s feasibility but also its advantages, such as stealthiness, controllability etc.
UR - http://www.scopus.com/inward/record.url?scp=84978230435&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-40253-6_2
DO - 10.1007/978-3-319-40253-6_2
M3 - Conference article published in proceeding or book
SN - 9783319402529
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 20
EP - 39
BT - Information Security and Privacy - 21st Australasian Conference, ACISP 2016, Proceedings
PB - Springer Verlag
T2 - 21st Australasian Conference on Information Security and Privacy, ACISP 2016
Y2 - 4 July 2016 through 6 July 2016
ER -