SOCELLBOT: A New Botnet Design to Infect Smartphones via Online Social Networking 2012 25 th IEEE Canadian Conference on Electrical and Computer Engineering(CCECE)

Slides:



Advertisements
Similar presentations
A Distributed Algorithm for the Dead End Problem of Location Based Routing in Sensor Networks Le Zou, Mi Lu, Zixiang Xiong, Department of Electrical Engineering,
Advertisements

Modeling Malware Spreading Dynamics Michele Garetto (Politecnico di Torino – Italy) Weibo Gong (University of Massachusetts – Amherst – MA) Don Towsley.
Spectrum Based RLA Detection Spectral property : the eigenvector entries for the attacking nodes,, has the normal distribution with mean and variance bounded.
MOSQUITO BREEDING ATTACK: Spread of bots using Peer To Peer INSTRUCTOR: Dr.Cliff Zou PRESENTED BY : BHARAT SOUNDARARAJAN & AMIT SHRIVATSAVA.
Forwarding Redundancy in Opportunistic Mobile Networks: Investigation and Elimination Wei Gao 1, Qinghua Li 2 and Guohong Cao 3 1 The University of Tennessee,
1 Complexity of Network Synchronization Raeda Naamnieh.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Scalable Application Layer Multicast Suman Banerjee Bobby Bhattacharjee Christopher Kommareddy ACM SIGCOMM Computer Communication Review, Proceedings of.
Adaptive Security for Wireless Sensor Networks Master Thesis – June 2006.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Architecture and Real Time Systems Lab University of Massachusetts, Amherst An Application Driven Reliability Measures and Evaluation Tool for Fault Tolerant.
Department of Computer Engineering Koc University, Istanbul, Turkey
CS401 presentation1 Effective Replica Allocation in Ad Hoc Networks for Improving Data Accessibility Takahiro Hara Presented by Mingsheng Peng (Proc. IEEE.
1 Algorithms for Bandwidth Efficient Multicast Routing in Multi-channel Multi-radio Wireless Mesh Networks Hoang Lan Nguyen and Uyen Trang Nguyen Presenter:
BOTNETS & TARGETED MALWARE Fernando Uribe. INTRODUCTION  Fernando Uribe   IT trainer and Consultant for over 15 years specializing.
1 Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm T. Holz, M. Steiner, F. Dahl, E. Biersack, and F. Freiling - Proceedings.
P2P Architecture Case Study: Gnutella Network
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
An Evaluation model of botnet based on peer to peer Gao Jian KangFeng ZHENG,YiXian Yang,XinXin Niu 2012 Fourth International Conference on Computational.
 Collection of connected programs communicating with similar programs to perform tasks  Legal  IRC bots to moderate/administer channels  Origin of.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 2007 (TPDS 2007)
Multiple Links Failover Mechanism for RPR Interconnected Rings IEEE WG Orlando, Florida USA March 11~16, 2007.
Multimedia & Networking Lab
Wei Gao1 and Qinghua Li2 1The University of Tennessee, Knoxville
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Your Friends Have More Friends Than You Do: Identifying Influential Mobile Users Through Random Walks Bo Han, Aravind Srinivasan University of Maryland.
UbiStore: Ubiquitous and Opportunistic Backup Architecture. Feiselia Tan, Sebastien Ardon, Max Ott Presented by: Zainab Aljazzaf.
Rate-based Data Propagation in Sensor Networks Gurdip Singh and Sandeep Pujar Computing and Information Sciences Sanjoy Das Electrical and Computer Engineering.
2012 4th International Conference on Cyber Conflict C. Czosseck, R. Ottis, K. Ziolkowski (Eds.) 2012 © NATO CCD COE Publications, Tallinn 朱祐呈.
 Two types of malware propagating through social networks, Cross Site Scripting (XSS) and Koobface worm.  How these two types of malware are propagated.
A novel approach of gateway selection and placement in cellular Wi-Fi system Presented By Rajesh Prasad.
Prophet Address Allocation for Large Scale MANETs Matt W. Mutka Dept. of Computer Science & Engineering Michigan State University East Lansing, USA IEEE.
Trust Propagation using Cellular Automata for UbiComp 28 th May 2004 —————— Dr. David Llewellyn-Jones, Prof. Madjid Merabti, Dr. Qi Shi, Dr. Bob Askwith.
Lan F.Akyildiz,Weilian Su, Erdal Cayirci,and Yogesh sankarasubramaniam IEEE Communications Magazine 2002 Speaker:earl A Survey on Sensor Networks.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
1 A Distributed Architecture for Multimedia in Dynamic Wireless Networks By UCLA C.R. Lin and M. Gerla IEEE GLOBECOM'95.
Salah A. Aly,Moustafa Youssef, Hager S. Darwish,Mahmoud Zidan Distributed Flooding-based Storage Algorithms for Large-Scale Wireless Sensor Networks Communications,
Peer Pressure: Distributed Recovery in Gnutella Pedram Keyani Brian Larson Muthukumar Senthil Computer Science Department Stanford University.
Studying Spamming Botnets Using Botlab 台灣科技大學資工所 楊馨豪 2009/10/201 Machine Learning And Bioinformatics Laboratory.
BotGraph: Large Scale Spamming Botnet Detection Yao Zhao, Yinglian Xie, Fang Yu, Qifa Ke, Yuan Yu, Yan Chen, and Eliot Gillum Speaker: 林佳宜.
Toward Worm Detection in Online Social Networks Wei Xu, Fangfang Zhang, and Sencun Zhu ACSAC
Collision-free Time Slot Reuse in Multi-hop Wireless Sensor Networks
TOPOLOGY MANAGEMENT IN COGMESH: A CLUSTER-BASED COGNITIVE RADIO MESH NETWORK Tao Chen; Honggang Zhang; Maggio, G.M.; Chlamtac, I.; Communications, 2007.
SRL: A Bidirectional Abstraction for Unidirectional Ad Hoc Networks. Venugopalan Ramasubramanian Ranveer Chandra Daniel Mosse.
Virtual Wire for Managing Virtual Dynamic Backbone in Wireless Ad Hoc Networks Bo Ryu, Jason Erickson, Jim Smallcomb ACM MOBICOM 1999.
Multi-channel Wireless Sensor Network MAC protocol based on dynamic route.
SybilGuard: Defending Against Sybil Attacks via Social Networks.
Socialbots and its implication On ONLINE SOCIAL Networks Md Abdul Alim, Xiang Li and Tianyi Pan Group 18.
Cooperative Mobile Live Streaming Considering Neighbor Reception SPEAKER: BO-YU HUANG ADVISOR: DR. HO-TING WU 2015/10/15 1.
Comparison of Tarry’s Algorithm and Awerbuch’s Algorithm CS 6/73201 Advanced Operating System Presentation by: Sanjitkumar Patel.
Authors: Yazan Boshmaf, Lldar Muslukhov, Konstantin Beznosov, Matei Ripeanu University of British Columbia Annual Computer Security Applications Conference.
A Framework for Reliable Routing in Mobile Ad Hoc Networks Zhenqiang Ye Srikanth V. Krishnamurthy Satish K. Tripathi.
CS 590 Term Project Epidemic model on Facebook
Data Dissemination Based on Ant Swarms for Wireless Sensor Networks S. Selvakennedy, S. Sinnappan, and Yi Shang IEEE 2006 CONSUMER COMMUNICATIONS and NETWORKING.
Speaker:Chiang Hong-Ren An Investigation and Implementation of Botnet Detection Schemes.
Energy Efficient Data Management for Wireless Sensor Networks with Data Sink Failure Hyunyoung Lee, Kyoungsook Lee, Lan Lin and Andreas Klappenecker †
Data Consolidation: A Task Scheduling and Data Migration Technique for Grid Networks Author: P. Kokkinos, K. Christodoulopoulos, A. Kretsis, and E. Varvarigos.
ICIIS Peradeniya, Sri Lanka1 An Enhanced Top-Down Cluster and Cluster Tree Formation Algorithm for Wireless Sensor Networks H. M. N. Dilum Bandara,
A Key Management Scheme for Distributed Sensor Networks Laurent Eschaenauer and Virgil D. Gligor.
TreeCast: A Stateless Addressing and Routing Architecture for Sensor Networks Santashil PalChaudhuri, Shu Du, Ami K. Saha, and David B. Johnson Department.
Speaker: Hom-Jay Hom Date:2009/10/20 Botnet Research Survey Zhaosheng Zhu. et al July 28-August
Selection and Navigation of Mobile Sensor Nodes Using a Sensor Network Atul Verma, Hemjit Sawant and Jindong Tan Department of Electrical and Computer.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Secure positioning in Wireless Networks Srdjan Capkun, Jean-Pierre Hubaux IEEE Journal on Selected area in Communication Jeon, Seung.
Presented by Edith Ngai MPhil Term 3 Presentation
Author:Zarei.M.;Faez.K. ;Nya.J.M.
Distributed voting application for handheld devices
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Dieudo Mulamba November 2017
Presentation transcript:

SOCELLBOT: A New Botnet Design to Infect Smartphones via Online Social Networking th IEEE Canadian Conference on Electrical and Computer Engineering(CCECE) Speaker: 呂映萱 102/10/24 Mahammad Reza Faghani and Uyen Trang Nguyen

Outline Abstract Introduction The proposed SoCellBot Simulation Results Conclusion 1/15

Abstract Smartphone Online Social network(OSN) A new cellular botnet named SoCellBot o Harder to detect o More resilient to bot failures o More cost-effective to cellular bots Raising awareness of new mobile botnets Preventive measures to deter SoCellBot 2/15

Introduction 3/15 OSNs Why are OSNs? 1.Most cellular network providers offer OSN access to their clients free of charge. 2.Messages exchanged in OSNs are usually encrypted. 3.The topology of an OSN-based botnet is more resilient to bot failures or unavailability thanks to the highly clustered structure of the social network graph.

The proposed SoCellBot SoCellBot Infects smartphones with malware The medium to recruit bots is OSN o Unlike SMS-based botnets, SoCellBot incurs small monetary costs. Architecture o Propagation mechanism o Command and Control channel o Botnet topology maintenance 4/15

The proposed SoCellBot Propagation Mechanism o Using social engineering techniques Eye-caching web link Infiltration 5/15

The proposed SoCellBot Command and Control Channel o Online social network messaging system (OSNMS) o Using an algorithm to disguise the commands to be normal o Sending message to a random user in Facebook is possible Infected users then infect their friends 6/15

The proposed SoCellBot SoCellBot Botnet Topology o Ensured to be connected o It is Resilient to bot failures and unavailability 7/15

Simulation OSN Model and Graphs Characteristics of OSN o Degree o Clustering coefficient o High clustering o Low average network distance 8/15

Simulation Parameters Original OSN o 3 OSNs of size 5000, 10000, o Using the algorithm by Holme and Beom to generate Equivalent random graphs(ERG) o Creating ERG by using an algorithm by Viger and Latapy Why ERG ? o ERG helps a malware to propagate faster than the original OSN graph o An attacker may be able to obtain the graph of OSN using a tool such as R[12] or Pajek[2] 9/ 15

Simulation Malware Propagation Model 1.Randomly choosing a node(user) for infiltration 2.If (the user executes the command) The user’s smartphone sends out a message to his/her friends, directing them to the malicious content (adjacent vertices in the social network graph) Upon receiving the message, each friend will execute the malware with a probability p 10/15

Simulation Setting fields to each command o A unique sequence number (SN) SNs help to minimize the number of duplicate messages o Time-to-live (TTL) A good estimate for the TTL is the diameter of the OSN graph How to avoid detection? o After receiving a command, a node checks the SN to see if it has seen the message before. if (message is new) o TTL-1 o Forwarding the message to its one-hop neighbors (adjacent vertices) else if (message is duplicate) o The node simply discards it 11/15

Results …. 12/15 The first set of experiments- Scenario 1 As p from 0.5 to 1, the malware propagate faster

Results 13/15 The first set of experiments- Scenario 2 and 3

Results 14/15 The second set of experiments

Conclusion OSNs are more suitable for mobile botnet communications than the traditional SMS The highly clustered structure of OSNs make the botnet immune from random node failures Disadvantage o It doesn’t show us the preventive measure Cautions is the parent of safety 15/15

Related Work “On Cellular Botnet: Measuring the Impact of Malicious Devices on a Cellular Network Core,” In Proc. CCS 2009, Chicago, USA 2009 Theorize the existence of cellular botnets The rigid hierarchical structure of cellular networks make them more vulnerable to the DoS attack. 16

Results The simulation was done in MATLAB based on discrete- event simulation Each data point in the graph is averaged over 100 runs, each of which started with a different node selected randomly T(t+1)=T(t)+N(t+1) t : one hop to reach all the neighbors T: infected smartphone N: newly infected smartphone 17