Return to search

Design of a hybrid command and control mobile botnet

Mobile devices have excelled in the 21st century due to the increasing popularity and
continuous improvement of mobile technology. Today mobile devices have become all-in-one portable devices, providing inter-connectivity, device-to-device communication and the capability to compete with personal computers. The improved capabilities and
popularity of mobile devices have, however, caught the attention of botnet developers,
allowing the threat of botnets to move into the mobile environment. A mobile botnet is
de fined as a collection of compromised mobile devices, controlled by a botmaster through a command and control (C&C) network to serve a malicious purpose. Previous studies of mobile botnet designs focused mostly on the C&C structure, investigating other mechanisms as potential C&C channels. None of these studies dealt with the use of a hybrid C&C structure within a mobile botnet design. This research consequently examines the problem of designing a new mobile botnet that uses a hybrid C&C structure. A model of this new hybrid design is proposed, describing the propagation vectors, C&C channels, and the topology. This hybrid design, called the Hybrid Mobile Botnet, explores the efficiency of multiple C&C channels against the following characteristics: no single point of failure must exist in the topology, low cost for command dissemination, limited network activities and low battery consumption per bot. The objectives were measured by using a prototype built according to the Hybrid Mobile Botnet model. The prototype was deployed on a small collection of mobile devices running the Android operating system. In addition, the prototype allowed for the design of a physical Bluetooth C&C channel, showing that such a channel is feasible, able to bypass security and capable of establishing a stealthy C&C channel. The successful execution of the prototype shows that a hybrid C&C structure is possible, allowing for a stealthy and cost-eff ective design. It also revels that current mobile technology is capable of supporting the development and execution of hybrid mobile botnets. Finally, this dissertation concludes with an exploration of the future of mobile botnets and the identifi cation of security steps users of mobile devices can follow to protect against their attacks. / Dissertation (MSc)--University of Pretoria, Pretoria 2014 / Computer Science / unrestricted

Identiferoai:union.ndltd.org:netd.ac.za/oai:union.ndltd.org:up/oai:repository.up.ac.za:2263/41816
Date January 2014
CreatorsPieterse, Heloise
ContributorsOlivier, Martin S, heloisep085@gmail.com
Source SetsSouth African National ETD Portal
LanguageEnglish
Detected LanguageEnglish
TypeDissertation
RightsCopyright is defined as described in the Deed of Recordal of Intellectual Rights entered into by and between the University of Pretoria, CSIR and Heloise Pieterse. The copyright in this work vests in the University of Pretoria and the CSIR. No part of this work may be reproduced or transmitted in any form or by any means, without the prior written permission of the University of Pretoria and the CSIR.

Page generated in 0.0034 seconds