SkyNET: A 3G-Enabled Mobile Attack Drone and Stealth Botmaster
نویسندگان
چکیده
SkyNET is a stealth network that connects hosts to a botmaster through a mobile drone. The network is comprised of machines on home Wi-Fi networks in a proximal urban area, and one or more autonomous attack drones. The SkyNET is used by a botmaster to command their botnet(s) without using the Internet. The drones are programmed to scour an urban area and compromise wireless networks. Once compromised, the drone attacks the local hosts. When a host is compromised it joins both the Internet-facing botnet, and the sun-facing SkyNET. Subsequent drone flights are used to issue command and control without ever linking the botmaster to the botnet via the Internet. Reverse engineering the botnet, or enumerating the bots, does not reveal the identity of the botmaster. An analyst is forced to observe the autonomous attack drone to bridge the command and control gap. In this paper we present a working example, SkyNET complete with a prototype attack drone, discuss the reality of using such a command and control method, and provide insight on how to prevent against such attacks.
منابع مشابه
3G WCDMA Mobile Network DoS Attack and Detection Technology
Currently, there has been a 3G mobile networks data traffic explosion due to the large increase in the number of smartphone users. Unlike a traditional wired infrastructure, 3G mobile networks have limited wireless resources and signaling procedures for complex wireless resource management. And mobile network security for various abnormal and malicious traffic technologies was not ready. So Mal...
متن کاملEffects of Short-term Exposure to Electromagnetic Fields Emitted by 3G and 4G Mobile Phones on Reaction Time and Short-term Memory
Introduction: There have been many studies conducted on the effects of mobile phones radiations on people’s health due to increasing number of mobile phones users. The present study aimed to investigate the effects of electromagnetic waves generated from 3G and 4G mobile phone radiations on student’s reaction time and short-term memory. <stro...
متن کاملStandardization of Mobile Phone Positioning for 3G Systems
Finding the location of the mobile phone is one of the important features of the 3G mobile communication system. Many valuable locationbased services can be enabled by this new feature. Telecommunication managers and engineers are often puzzled by location terminologies and techniques as well as how to implement them, since location systems are not natural evolution from past generations of tel...
متن کاملAdvanced Methods for Botnet Intrusion Detection Systems
Today, our dependence on the internet has grown manifold. So has the need to protect our vast personal information accessible via web interfaces such as online passwords, corporate secrets, online banking accounts, and social networking accounts like Facebook. The appearance of botnets in the internet scene over the last decade, and their ever changing behavior has caused real challenges that c...
متن کاملAES and SNOW 3G are Feasible Choices for a 5G Phone from Energy Perspective
The aspirations for a 5th generation (5G) mobile network are high. It has a vision of unprecedented data-rate and extremely pervasive connectivity. To cater such aspirations in a mobile phone, many existing efficiency aspects of a mobile phone need to be reviewed. We look into the matter of required energy to encrypt and decrypt the huge amount of traffic that will leave from and enter into a 5...
متن کامل