Skip to main content

All Bot Net: A Need for Smartphone P2P Awareness

  • Conference paper
Digital Forensics and Cyber Crime (ICDF2C 2011)

Abstract

This paper is a call for law enforcement and other members of the digital forensic community to be aware of smartphones connecting to Peer-to-Peer networks. This paper also offers a review of botnet concepts and research surrounding smartphone malware.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Holz, K., Wicherski, B.: Know your Enemy: Tracking Botnets. The Honeynet Project (2008)

    Google Scholar 

  2. Long, D.: The Lazy Person’s Guide to Botnets. In: CHIPS (2008)

    Google Scholar 

  3. Shadowserver: Botnets. Shadowserver (2009)

    Google Scholar 

  4. Skoudis, E.: Liston.: Counter Hack Reloaded. Pearson Education, Inc., NJ (2006)

    Google Scholar 

  5. Grizzard, J.: Peer-to-Peer Botnets: Overview and Case Study. The Johns Hopkins University Applied Physics Laboratory (2007)

    Google Scholar 

  6. Lehtinen, J.: Secure and Mobile P2P File Sharing. In: TKKK (2006)

    Google Scholar 

  7. Fitzek, F.H.P., Charaf, H.: Mobile Peer-to-Peer Networks: An Introduction to the Tutorial Guide. Wiley (2009)

    Book  Google Scholar 

  8. Liberatore, M., Erdely, R., Kerle, T., Levine, B.N., Shields, C.: Forensic investigation of peer-to-peer file sharing networks. In: Digital Investigation (2010)

    Google Scholar 

  9. Dybwad, B.: Symella: a Gnutella client for Symbian smartphones. In: AOL (2005)

    Google Scholar 

  10. Srirama, S.N.: Publishing and Discovery of Mobile Web Services in Peer to Peer Networks. In: German Research Foundation, DFG (2010)

    Google Scholar 

  11. Heikkinen, M.V.J., Kivi, A., Verkasalo, H.: Measuring Mobile Peer-to-Peer Usage: Case Finland. TKK Helsinki University of Technology (2007)

    Google Scholar 

  12. Fuentes, D., Álvarez, J., Ortega, J., Gonzalez-Abril, L., Velasco, F.: Trojan horses in mobile devices. In: ComSIS (2010)

    Google Scholar 

  13. Symantec: The Need for Multi-Channel Security, http://www.symantec.com/business/resources/articles/article.jsp?aid=20091110_multi_channel_security

  14. Zeng, Y., Hu, X., Shin, K.G.: Design of SMS Commanded-and-Controlled and P2P-Structured Mobile Botnets. The University of Michigan (2010)

    Google Scholar 

  15. Asrar, I.: Could sexy Space be the Birth of the SMS Botnet? Symantec Corporation (2009)

    Google Scholar 

  16. InfoNIAC: Get Ready for Cell Phone Botnets, http://www.infoniac.com/hi-tech/get-ready-for-cell-phone-botnets.html

  17. Baylor, K., Brown, C.: TrendMicro: The Threat Defined. Killing Botnets. McAfee (2006), http://community.trendmicro.com/t5/Web-Threat-Spotlight/ZBOT-Zeus-Sends-Out-Tailor-Made-Spam/ba-p/1245

  18. Polska, C.: ZITMO: The new mobile threat, http://www.cert.pl/news/3193/langswitch_lang/en

  19. McAfee: SymbOS/Zitmo.A. McAfee, Inc. (2011)

    Google Scholar 

  20. Hoffman, D. V.: Smartphone Hacks and Attacks: A Demonstration of Current Threats to Mobile Devices. SmobileSystems (2008)

    Google Scholar 

  21. Khadem, S.: Security Issues in Smartphones and their effects on the Telecom Networks. Chalmers University of Technology (2010)

    Google Scholar 

  22. Enck, W., Ongtang, M., McDaniel, P.: On Lightweight Mobile Phone Application Certification. In: CCS (2009)

    Google Scholar 

  23. Singh, K., Sangal, S., Jain, N., Traynor, P., Lee, W.: Evaluating Bluetooth as a Medium for Botnet Command and Control. Springer, Heidelberg (2010)

    Book  Google Scholar 

  24. Tijerina, D., Brown, D.: Is that a bot in your pocket? Or does it just look like one? TippingPoint’s DVLabs (2010)

    Google Scholar 

  25. Randow, A.: Touring the Mobile Market: why native apps are not the solution for the mobile universe. TourSphere (2010)

    Google Scholar 

  26. Liu, J., Xiao, Y., Ghaboosi, K., Deng, H., Zhang, J.: Botnet: Classification, Attacks, Detection, Tracing, and Preventive Measures. EURASIP Journal on Wireless Communications and Networking (2009)

    Google Scholar 

  27. FBI: The Case of the ”Zombie King”. Federal Bureau of Investigation (2009)

    Google Scholar 

  28. Baylor, K., Brown, C.: Killing Botnets. McAfee (2006)

    Google Scholar 

  29. Liberatore, M., Levine, B.N., Shields, C.: Strengthening Forensic Investigations of Child Pornography on P2P Networks. ACM (2010)

    Google Scholar 

  30. Gartner: Gartner Says Worldwide Mobile Phone Sales Grew 35 Percent in Third Quarter 2010; Smartphone Sales Increased 96 Percent. Gartner (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Cole, K.A., Silva, R.L., Mislan, R.P. (2012). All Bot Net: A Need for Smartphone P2P Awareness. In: Gladyshev, P., Rogers, M.K. (eds) Digital Forensics and Cyber Crime. ICDF2C 2011. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 88. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35515-8_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35515-8_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35514-1

  • Online ISBN: 978-3-642-35515-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics