Abstract
This paper is a call for law enforcement and other members of the digital forensic community to be aware of smartphones connecting to Peer-to-Peer networks. This paper also offers a review of botnet concepts and research surrounding smartphone malware.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Holz, K., Wicherski, B.: Know your Enemy: Tracking Botnets. The Honeynet Project (2008)
Long, D.: The Lazy Person’s Guide to Botnets. In: CHIPS (2008)
Shadowserver: Botnets. Shadowserver (2009)
Skoudis, E.: Liston.: Counter Hack Reloaded. Pearson Education, Inc., NJ (2006)
Grizzard, J.: Peer-to-Peer Botnets: Overview and Case Study. The Johns Hopkins University Applied Physics Laboratory (2007)
Lehtinen, J.: Secure and Mobile P2P File Sharing. In: TKKK (2006)
Fitzek, F.H.P., Charaf, H.: Mobile Peer-to-Peer Networks: An Introduction to the Tutorial Guide. Wiley (2009)
Liberatore, M., Erdely, R., Kerle, T., Levine, B.N., Shields, C.: Forensic investigation of peer-to-peer file sharing networks. In: Digital Investigation (2010)
Dybwad, B.: Symella: a Gnutella client for Symbian smartphones. In: AOL (2005)
Srirama, S.N.: Publishing and Discovery of Mobile Web Services in Peer to Peer Networks. In: German Research Foundation, DFG (2010)
Heikkinen, M.V.J., Kivi, A., Verkasalo, H.: Measuring Mobile Peer-to-Peer Usage: Case Finland. TKK Helsinki University of Technology (2007)
Fuentes, D., Álvarez, J., Ortega, J., Gonzalez-Abril, L., Velasco, F.: Trojan horses in mobile devices. In: ComSIS (2010)
Symantec: The Need for Multi-Channel Security, http://www.symantec.com/business/resources/articles/article.jsp?aid=20091110_multi_channel_security
Zeng, Y., Hu, X., Shin, K.G.: Design of SMS Commanded-and-Controlled and P2P-Structured Mobile Botnets. The University of Michigan (2010)
Asrar, I.: Could sexy Space be the Birth of the SMS Botnet? Symantec Corporation (2009)
InfoNIAC: Get Ready for Cell Phone Botnets, http://www.infoniac.com/hi-tech/get-ready-for-cell-phone-botnets.html
Baylor, K., Brown, C.: TrendMicro: The Threat Defined. Killing Botnets. McAfee (2006), http://community.trendmicro.com/t5/Web-Threat-Spotlight/ZBOT-Zeus-Sends-Out-Tailor-Made-Spam/ba-p/1245
Polska, C.: ZITMO: The new mobile threat, http://www.cert.pl/news/3193/langswitch_lang/en
McAfee: SymbOS/Zitmo.A. McAfee, Inc. (2011)
Hoffman, D. V.: Smartphone Hacks and Attacks: A Demonstration of Current Threats to Mobile Devices. SmobileSystems (2008)
Khadem, S.: Security Issues in Smartphones and their effects on the Telecom Networks. Chalmers University of Technology (2010)
Enck, W., Ongtang, M., McDaniel, P.: On Lightweight Mobile Phone Application Certification. In: CCS (2009)
Singh, K., Sangal, S., Jain, N., Traynor, P., Lee, W.: Evaluating Bluetooth as a Medium for Botnet Command and Control. Springer, Heidelberg (2010)
Tijerina, D., Brown, D.: Is that a bot in your pocket? Or does it just look like one? TippingPoint’s DVLabs (2010)
Randow, A.: Touring the Mobile Market: why native apps are not the solution for the mobile universe. TourSphere (2010)
Liu, J., Xiao, Y., Ghaboosi, K., Deng, H., Zhang, J.: Botnet: Classification, Attacks, Detection, Tracing, and Preventive Measures. EURASIP Journal on Wireless Communications and Networking (2009)
FBI: The Case of the ”Zombie King”. Federal Bureau of Investigation (2009)
Baylor, K., Brown, C.: Killing Botnets. McAfee (2006)
Liberatore, M., Levine, B.N., Shields, C.: Strengthening Forensic Investigations of Child Pornography on P2P Networks. ACM (2010)
Gartner: Gartner Says Worldwide Mobile Phone Sales Grew 35 Percent in Third Quarter 2010; Smartphone Sales Increased 96 Percent. Gartner (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Cole, K.A., Silva, R.L., Mislan, R.P. (2012). All Bot Net: A Need for Smartphone P2P Awareness. In: Gladyshev, P., Rogers, M.K. (eds) Digital Forensics and Cyber Crime. ICDF2C 2011. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 88. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35515-8_4
Download citation
DOI: https://doi.org/10.1007/978-3-642-35515-8_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35514-1
Online ISBN: 978-3-642-35515-8
eBook Packages: Computer ScienceComputer Science (R0)