Call for Paper - January 2024 Edition
IJCA solicits original research papers for the January 2024 Edition. Last date of manuscript submission is December 20, 2023. Read More

Study of Mobile Botnets: An Analysis from the Perspective of Efficient Generalized Forensics Framework for Mobile Devices

IJCA Proceedings on National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2012)
© 2012 by IJCA Journal
ncipet - Number 15
Year of Publication: 2012
Rizwan Ahmed
Rajiv V. Dharaskar

Rizwan Ahmed and Rajiv V Dharaskar. Article: Study of Mobile Botnets: An Analysis from the Perspective of Efficient Generalized Forensics Framework for Mobile Devices. IJCA Proceedings on National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2012) ncipet(15):5-8, March 2012. Full text available. BibTeX

	author = {Rizwan Ahmed and Rajiv V. Dharaskar},
	title = {Article: Study of Mobile Botnets: An Analysis from the Perspective of Efficient Generalized Forensics Framework for Mobile Devices},
	journal = {IJCA Proceedings on National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2012)},
	year = {2012},
	volume = {ncipet},
	number = {15},
	pages = {5-8},
	month = {March},
	note = {Full text available}


Botnets represent a serious security threat on the Internet. Current security mechanism are typically inadequate for protecting against the latest breed of botnets, as botherders constantly develop new techniques and methods to frustrate investigators. Until recently, mobile networks have been relatively isolated from the Internet, so there has been little need for protecting against botnets. However, this situation is rapidly changing. With the rapid development of the computing and Internet access (i.e., using WiFi, GPRS and 3G) capabilities of smartphones, constructing practical mobile botnets has become an underlying trend. Thus, threats on the Internet most likely will migrate over to the mobile networks and vice versa. Botnets of malware injected into mobile devices will probably appear very soon, and there are already signs of this happening. This paper analyses the potential threat of botnets based on mobile networks. The study done will be further utilized for improving the performance of the developed “Efficient Generalized Forensics Framework for Mobile Devices”. To conclude our paper, we suggest possible defenses against the emerging threat


  • Norton. Bots and Botnets—A Growing Threat. Internet:, read: 01.01.2012.
  • Graig A. Schiller, Jim Binkley with Gadi Evron, Carsten Willems, Tony Bradley, David Harley, and Michael Cross. Botnets: The Killer Web App. Andrew Williams, Syngress, 2007.
  • Kelly Jackson Higgins. Cellphone botnets, blackmailing voip and a healthy cybercrime economy. Darkreading, Oct 2008., read: 01.01.2012.
  • Lasse Trolle Borup. Peer to peer botnets: A case study on Waledac. Master’s thesis, Technical University of Denmark, Department of Informatics and Mathematical Modeling, System Security, Building 321, DK-2800, Kongens Lyngby, Denmark, 2009.
  • Gwena¨el Le Bodic. Mobile Messaging technologies and services. Wiley and Sons Ltd, Second Edition, 2005.
  • Sumit Kasera and Nishit Narang. 3G Mobile Networks. Architecture, Protocols and Procedure. Tata MCGraw-Hill Publishing Company, limited edition, 2005.
  • Ajay R. Mishra. Advanced cellular network planning and optimisation: 2G/2.5G/3G ... evolution to 4G. John Wiley and Sons, 2007.
  • Cui Xiang, Fang Binxing, Yin Lihua, Liu Xiaoyi, and Zang Tianning. Andbot: Towards Advanced Mobile Botnets. , read: 01.01.2012.
  • Axelle Apvrille. Symbian worm Yxes Towards mobile botnets., read: 01.01.2012.
  • P.A. Porras, H. Saidi, V. Yegneswaran, “An Analysis of the iKee.B iPhone Botnet,” in Proceedings of the 2nd International ICST Conference on Security and Privacy on Mobile Information and Communications Systems (Mobisec), May 2010
  • P. Traynor,M. Lin, M. Ongtang, V. Rao, T. Jaeger, T. La Porta and P. McDaniel, “On Cellular Botnets: Measuring the Impact of Malicious Devices on a Cellular Network Core,” in ACM Conference on Computer and Communications Security (CCS), November 2009
  • Anne Ruste Flø and Audun Jøsang. Consequences of Botnets Spreading to Mobile Devices. Proceedings of the 14th Nordic Conference on Secure IT Systems (NordSec 2009). Oslo, October 2009.
  • Suzanne Choney. Mobile giving to help Haiti exceeds $30 million,, read: 01.01.2012.
  • W. Jansen and K. Scarfone. Computer security, guidelines on cell phone and pda security. Technical report, NIST- National Institute of standards and Technology, US Department of Commerce, 2008. Special Publication 800-124.
  • Jr Raphael. Botnet spam attacks to target cell phones. PC World, Internet, Oct 2008., read: 01.01.2012.
  • C. Mulliner, J.P. SeifertIn. Rise of the iBots: 0wning a telco network. In the Proceedings of the 5th IEEE International Conference on Malicious and Unwanted Software (Malware) Nancy, France 19-20 October, 2010.
  • P. Wang, S. Sparks et al. An advanced hybrid peer to peer botnet. Proc. of the HotBots’07, First Workshop on Hot Topics in Understanding Botnets, Cambridge, MA, 2007.
  • R. Vogt, J. Aycock, and M. Jacobson, “Army of botnets,” Proc. of 14th Annual Network and Distributed System Security Symposium (NDSS’07), 2007.
  • R. Hund, M. Hamann and T. Holz. Towards Next-Generation Botnets. Proc. of the fourth European Conference on Computer Network Defense (EC2ND 08), 2008.
  • G. Starnberger, C. Kruegel, and E. Kirda, “Overbot - a botnet protocol based on kademlia,” in Proc. of the 4th Int. Conf. on Security and Privacy in Communication Networks (SecureComm 08). September 2008.
  • Kapil Singh, Abhinav Srivastava et al. Evaluating Email’s Feasibility for Botnet Command and Control // Proceedings of The 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2008). Anchorage, Alaska. June 2008.
  • K. Singh, S. Sangal, N. Jain, P. Traynor and W.Lee, “Evaluating Bluetooth as a Medium for Botnet Command and Control,” in Proceedings of the International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA), July 2010.
  • Yuanyuan Zeng, Xin Hu, Kang G. Shin, “Design of SMS Commandedand-Controlled and P2P-Structured Mobile Botnet”, The University of Michigan, Ann Arbor, MI 48109-2121, U.S.A. 2009
  • Yan Zhang, Jun Zheng, and Miao Ma. Handbook of Research on Wireless Security. Idea Group Inc (IGI), 2008.
  • Irfan Asrar. Could sexy space be the birth of the sms botnet? Symantec, Internet blog, July 2009., read: 01.01.2012.
  • Norman ASA. Mobile phone threats - hype or (finally) truth? Security Articles- Archive, 2009., read: 01.01.2012.Forman, G. 2003. An extensive empirical study of feature selection metrics for text classification. J. Mach. Learn. Res. 3 (Mar. 2003), 1289-1305.
  • Neal Leavitt. Mobile Security: Finally a Serious Problem?, 2011, , read: 01.01.2012.
  • Jim Giles, Sneaky app shows potential for smartphone botnets, March 2010,, read: 01.01.2012