I. Introduction
With the proliferation of smart handheld devices and the exploded number of malware on mobile platforms, a mobile botnet [1], [2], which is a collection of compromised (or infected) mobile nodes. that can perform coordinated attacks, no longer occurs in theory, but comes into practice. For example, Ikee. B [3] in 2009 was found to include command and control logic to render a number of infected iPhones under the control. In 2012, Symantec found a large botnet Android. Bmaster [4] in China that had infected an estimate of hundreds of thousands of Android phones. As a result, mobile botnets have already become one of the most serious security threats to today's mobile networks and applications.