• DocumentCode
    170645
  • Title

    How can botnets cause storms? Understanding the evolution and impact of mobile botnets

  • Author

    Zhuo Lu ; Wenye Wang ; Wang, Chingyue

  • Author_Institution
    Dept. of Electr. & Comput. Eng., North Carolina State Univ., Raleigh, NC, USA
  • fYear
    2014
  • fDate
    April 27 2014-May 2 2014
  • Firstpage
    1501
  • Lastpage
    1509
  • Abstract
    A botnet in mobile networks is a collection of compromised nodes due to mobile malware, which are able to perform coordinated attacks. Different from Internet botnets, mobile botnets do not need to propagate using centralized infrastructures, but can keep compromising vulnerable nodes in close proximity and evolving organically via data forwarding. Such a distributed mechanism relies heavily on node mobility as well as wireless links, therefore breaks down the underlying premise in existing epidemic modeling for Internet botnets. In this paper, we adopt a stochastic approach to study the evolution and impact of mobile botnets. We find that node mobility can be a trigger to botnet propagation storms: the average size (i.e., number of compromised nodes) of a botnet increases quadratically over time if the mobility range that each node can reach exceeds a threshold; otherwise, the botnet can only contaminate a limited number of nodes with average size always bounded above. This also reveals that mobile botnets can propagate at the fastest rate of quadratic growth in size, which is substantially slower than the exponential growth of Internet botnets. To measure the denial-of-service impact of a mobile botnet, we define a new metric, called last chipper time, which is the last time that service requests, even partially, can still be processed on time as the botnet keeps propagating and launching attacks. The last chipper time is identified to decrease at most on the order of 1/√B, where B is the network bandwidth. This result reveals that although increasing network bandwidth can help with mobile services; at the same time, it can indeed escalate the risk for services being disrupted by mobile botnets.
  • Keywords
    computer network security; invasive software; mobile computing; Internet botnets; botnet propagation storms; compromised nodes; coordinated attacks; data forwarding; denial-of-service impact; distributed mechanism; epidemic modeling; exponential growth; last chipper time; mobile botnets; mobile malware; mobile networks; mobile services; mobility range; network bandwidth; node mobility; quadratic growth; service requests; wireless links; Internet; Malware; Mobile computing; Mobile nodes; Peer-to-peer computing;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    INFOCOM, 2014 Proceedings IEEE
  • Conference_Location
    Toronto, ON
  • Type

    conf

  • DOI
    10.1109/INFOCOM.2014.6848085
  • Filename
    6848085