Gleer: A Novel Gini-Based Energy Balancing Scheme for Mobile Botnet Retopology

Mobile botnet has recently evolved due to the rapid growth of smartphone technologies. Unlike legacy botnets, mobile devices are characterized by limited power capacity, calculation capabilities, and wide communication methods. As such, the logical topology structure and communication mode have to be redesigned for mobile botnets to narrow energy gap and lower the reduction speed of nodes. In this paper, we try to design a novel Gini-based energy balancing scheme (Gleer) for the atomic network, which is a fundamental component of the heterogeneous multilayer mobile botnet. Firstly, for each operation cycle, we utilize the dynamic energy threshold to categorize atomic network into two groups. Then, the Gini coefficient is introduced to estimate botnet energy gap and to regulate the probability for each node to be picked as a region C&C server. Experimental results indicate that our proposed method can effectively prolong the botnet lifetime and prevent the reduction of network size. Meanwhile, the stealthiness of botnet with Gleer scheme is analyzed from users’ perspective, and results show that the proposed scheme works well in the reduction of user’ detection awareness.

[1]  Jin Han,et al.  China's income inequality in the global context , 2016 .

[2]  Xiapu Luo,et al.  Building a Scalable System for Stealthy P2P-Botnet Detection , 2014, IEEE Transactions on Information Forensics and Security.

[3]  Kang G. Shin,et al.  Design of SMS commanded-and-controlled and P2P-structured mobile botnets , 2012, WISEC '12.

[4]  Xiangjian He,et al.  PAWN: a payload‐based mutual authentication scheme for wireless sensor networks , 2017, Concurr. Comput. Pract. Exp..

[5]  Enzo Baccarelli,et al.  P-SEP: a prolong stable election routing algorithm for energy-limited heterogeneous fog-supported wireless sensor networks , 2017, The Journal of Supercomputing.

[6]  Daniele Sgandurra,et al.  A Survey on Security for Mobile Devices , 2013, IEEE Communications Surveys & Tutorials.

[7]  Zhang Jian-hua,et al.  An Convenient Method to Calculate Gini Coefficient , 2007 .

[8]  Anantha P. Chandrakasan,et al.  An application-specific protocol architecture for wireless microsensor networks , 2002, IEEE Trans. Wirel. Commun..

[9]  Hein S. Venter,et al.  Mobile Botnet Detection Using Network Forensics , 2010, FIS.

[10]  L.-A. Dessaint,et al.  A Generic Battery Model for the Dynamic Simulation of Hybrid Electric Vehicles , 2007, 2007 IEEE Vehicle Power and Propulsion Conference.

[11]  Lei Liu,et al.  VirusMeter: Preventing Your Cellphone from Spies , 2009, RAID.

[12]  C. M. Shepherd Design of Primary and Secondary Cells II . An Equation Describing Battery Discharge , 1965 .

[13]  Yao Zheng,et al.  PeerClean: Unveiling peer-to-peer botnets through dynamic group behavior analysis , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).

[14]  Ossama Younis,et al.  HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks , 2004, IEEE Transactions on Mobile Computing.

[15]  Wenke Lee,et al.  Evaluating Bluetooth as a Medium for Botnet Command and Control , 2010, DIMVA.

[16]  Guang Yang,et al.  The Design of SMS Based Heterogeneous Mobile Botnet , 2012, J. Comput..

[17]  Gabriel Maciá-Fernández,et al.  Survey and taxonomy of botnet research through life-cycle , 2013, CSUR.

[18]  Judith A. Clarke,et al.  On variance estimation for a Gini coefficient estimator obtained from complex survey data , 2015 .

[19]  Jitendranath Mungara,et al.  NS3 simulation studies for optimized neighbour discovery in 6LoWPAN networks , 2016, 2016 3rd International Symposium on Wireless Systems within the Conferences on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS-SWS).

[20]  Xin-Lin Huang,et al.  Analytical Model and Performance Evaluation of Long-Term Evolution for Vehicle Safety Services , 2017, IEEE Transactions on Vehicular Technology.

[21]  Apostolos Malatras,et al.  Mobile Botnets Taxonomy and Challenges , 2015, 2015 European Intelligence and Security Informatics Conference.

[22]  Yong Wang,et al.  Smartphone Security Challenges , 2012, Computer.

[23]  Z. Fang,et al.  Estimating Gini Coefficient Based on Hurun Report and Poverty Line , 2013 .

[24]  F. Teng,et al.  Metric of Carbon Equity: Carbon Gini Index Based on Historical Cumulative Emission per Capita , 2011 .

[25]  Imran Khan,et al.  Wireless sensor network virtualization: A survey , 2015, IEEE Communications Surveys & Tutorials.

[26]  Wei Chen,et al.  MUSE: Towards Robust and Stealthy Mobile Botnets via Multiple Message Push Services , 2016, ACISP.

[27]  Jun Zhao,et al.  Topological Properties of Secure Wireless Sensor Networks Under the $q$ -Composite Key Predistribution Scheme With Unreliable Links , 2017, IEEE/ACM Transactions on Networking.

[28]  Wei Chen,et al.  CloudBot: Advanced mobile botnets using ubiquitous cloud technologies , 2017, Pervasive Mob. Comput..

[29]  Guangping Zeng,et al.  Gini coefficient-based task allocation for multi-robot systems with limited energy resources , 2018, IEEE/CAA Journal of Automatica Sinica.

[30]  Azer Bestavros,et al.  SEP: A Stable Election Protocol for clustered heterogeneous wireless sensor networks , 2004 .

[31]  Miroslaw Malek,et al.  Malware Threats and Solutions for Trustworthy Mobile Systems Design , 2017 .