{"title":"Detection of Mobile Botnet Using VPN","authors":"Byungha Choi, Sung-Kyo Choi, Kyungsan Cho","doi":"10.1109/IMIS.2013.32","DOIUrl":null,"url":null,"abstract":"As most applications in wired networks become available on mobile devices and mobile networks are well integrated with Internet, Botnet becomes the most significant threat to mobile devices. We propose a mobile Botnet detection scheme that detects \"pull\" style C&C channel. Our network-based scheme detects Botnet by inspecting abnormal flow features of C&C traffic traveling through VPN which provides a shared path for both 3/4G and WiFi. Through the verification analysis under real Botnet attacks, we show that our proposed scheme provides high detection rate by using abnormal models as well as low FP rate by adding white list and signatures.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"24 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"32","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IMIS.2013.32","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 32
Abstract
As most applications in wired networks become available on mobile devices and mobile networks are well integrated with Internet, Botnet becomes the most significant threat to mobile devices. We propose a mobile Botnet detection scheme that detects "pull" style C&C channel. Our network-based scheme detects Botnet by inspecting abnormal flow features of C&C traffic traveling through VPN which provides a shared path for both 3/4G and WiFi. Through the verification analysis under real Botnet attacks, we show that our proposed scheme provides high detection rate by using abnormal models as well as low FP rate by adding white list and signatures.