Design Methodology of Botnet Attack for Smartphone

International Journal of Computer Science and Engineering
© 2015 by SSRG - IJCSE Journal
Volume 2 Issue 5
Year of Publication : 2015
Authors : Prof. Sonali Tidke, Dr. Pravin Karde

How to Cite?

Prof. Sonali Tidke, Dr. Pravin Karde, "Design Methodology of Botnet Attack for Smartphone," SSRG International Journal of Computer Science and Engineering , vol. 2,  no. 5, pp. 11-15, 2015. Crossref,


Smartphones are mini laptops for its users. Besides calling, smartphones are used for banking, shopping, mailing, web surfing, socializing etc. Most of the smartphone users are storing their important, personal and sensitive information on their device without providing sufficient security and are unaware of the risk involved in it. This paper provides a closer look on how smartphone Botnet can do if not secured properly.


C & C, IMEI, IMSI, OSM, HttP2P...


[1] Adeeb Alhomour, Irfan Awan & Jules Pagna Disso, “Towards An Enterprise Self-healing System against BOTNETs Attacks”, International Conference on Computing, Networking and Communications, IEEE 2013 Invited Positions Paper. 
[2] Abdullahi Arabo & Bernardi Praggono, “Mobile Malware & Smart Devices Security : Trends, Challenges and Solutions”, 19th International Conferences on Control System and Computer Science, 2013, pp 526-531. 
[3] Guining Geng, Guoai Xu, Miao Zhang and Yanhui Guo, Guang Yang, Wei Cui, “The Design of SMS 
[4] dia 
[5] commare and -and-control-%28c-c%29-server. 
[7] Yuanyuan Zeng, “On Detection of Current and Next- Generation BOTNETs”, A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy (Computer Science and Engineering) in The University of Michigan, 2012. 
[8] Collin Mulliner and Charlie Miller. Fuzzing the phone in your phone. In Black- Hat Security Conference, 2009. [9] create-simple-sms-spam-Botnet 
[10] Ihsan Ullah, Naveed Khan and Hatim Abolsamh, “Survey on Botnet : Its Architecture, Detection, Prevention and Mitigation”,IEEE 2013, pp 660 – 665 
[11] Ping Wang, Sherri Sparks and Cliff Zou. “An Advanced Hybrid Peer to Peer Botnet”, IEEE Transactions on Dependable And Secure Computing, Volume 7, No. 2, April – June 2010. 
[12] J. Goebel and T. Holz, "Rishi: Identify Bot Contaminated Hosts by IRC Nickname Evaluation," in Proceedings of the First Conference on Hot Topics in Understanding Botnets, 2007, pp. 8-20. 
[13] J. S. Bhatia, R. K. Sehgal, and S. Kumar, "Honeynet Based Botnet Detection Using Command Signatures," Advances in Wireless, Mobile Networks and Applications, vol. 154, pp. 69- 78, 2011. 
[14] W. Zanoramy, A. Zakaria, and M. L. M. Kiah, "A Review on Artificial Intelligence Techniques for Developing Intelligent Honeypot," in Proceedings of the 3rd International Conference on Next Generation Information Technology (ICNIT), Seoul: Korea, 2012, pp. 696-701. 
[15] Meisam Eslahi, Rosli Salleh and Nor Badrul Anuar , “Bots and Botnets: An Overview of Characteristics, Detection and Challenges”, 2012 IEEE International Conference on Control System, Computing and Engineering, 23 - 25 Nov. 2012, Penang, Malaysia, pp 349-354. 
[16] M. Bailey, E. Cooke, F. Jahanian, X. Yunjing, and M. Karir, "A Survey of Botnet Technology and Defenses," in Proceedings of the Cybersecurity Applications & Technology Conference for Homeland Security (CATCH), 2009, pp. 299- 304. 
[17] Joany Boutet and Lori Homsher, “Malicious Android Applications: Risks and Exploitation, How I Met All Your Friends, A Spyware story about Android Application and Reverse Engineering”, Information Security Reading Room, The SANS Institute, pp. 1 – 5, 2 March 2010. Based Heterogeneous Mobile Botnet”, Journal of Computers, Vol. 7, Issue 1, pp. 235-243, 2012. 
[18] Abdullahi Arabo and Bernardi Pranggono, “Mobile Malware and Smart Device Security: Trends, Challenges and Solutions”, 19th International Conference on Control Systems and Computer Science, IEEE Computer Society, pp. 526-531, 10 – 11 September 2013.