From Botnets to MobiBots: A Novel Malicious Communication Paradigm for Mobile Botnets

被引:6
|
作者
Mtibaa, Abderrahmen [1 ]
Harras, Khaled A. [2 ]
Alnuweiri, Hussein [1 ]
机构
[1] Texas A&M Univ, College Stn, TX 77843 USA
[2] Carnegie Mellon Univ, Pittsburgh, PA 15213 USA
关键词
D O I
10.1109/MCOM.2015.7180509
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cyber security is moving from traditional infrastructure to sophisticated mobile infrastructureless threats. A major concern is that such imminent transition is happening at a rate far exceeding the evolution of security solutions. In fact, the transformation of mobile devices into highly capable computing platforms makes the possibility of security attacks originating from within the mobile network a reality. Today, mobile devices are capable of initiating sophisticated cyberattacks, especially when they coordinate together to form what we call a MobiBot. MobiBots differ from classical botnets in that they exploit mobile operating system vulnerabilities and the advantages of device-to-device communication to mask malicious code propagation.
引用
收藏
页码:61 / 67
页数:7
相关论文
共 50 条
  • [1] Mobile Botnets Taxonomy and Challenges
    Malatras, Apostolos
    Freyssinet, Eric
    Beslay, Laurent
    2015 EUROPEAN INTELLIGENCE AND SECURITY INFORMATICS CONFERENCE (EISIC), 2015, : 149 - 152
  • [2] How Can Botnets Cause Storms? Understanding the Evolution and Impact of Mobile Botnets
    Lu, Zhuo
    Wang, Wenye
    Wang, Cliff
    2014 PROCEEDINGS IEEE INFOCOM, 2014, : 1501 - 1509
  • [3] Portfolio optimization of computer and mobile botnets
    Qi Liao
    Zhen Li
    International Journal of Information Security, 2014, 13 : 1 - 14
  • [4] Portfolio optimization of computer and mobile botnets
    Liao, Qi
    Li, Zhen
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2014, 13 (01) : 1 - 14
  • [5] On the Evolution and Impact of Mobile Botnets in Wireless Networks
    Lu, Zhuo
    Wang, Wenye
    Wang, Cliff
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2016, 15 (09) : 2304 - 2316
  • [6] Symbian worm Yxes: towards mobile botnets?
    Apvrille, Axelle
    JOURNAL IN COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2012, 8 (04): : 117 - 131
  • [7] Symbian worm Yxes: towards mobile botnets?
    Axelle Apvrille
    Journal in Computer Virology, 2012, 8 (4): : 117 - 131
  • [8] An adaptive framework for the detection of novel botnets
    Cid-Fuentes, Javier Alvarez
    Szabo, Claudia
    Falkner, Katrina
    COMPUTERS & SECURITY, 2018, 79 : 148 - 161
  • [9] Detection of Mobile Botnets using Neural Networks
    Oulehla, Milan
    Oplatkova, Zuzana Kominkova
    Malanik, David
    PROCEEDINGS OF 2016 FUTURE TECHNOLOGIES CONFERENCE (FTC), 2016, : 1324 - 1326
  • [10] Detecting Malicious Botnets in IoT Networks Using Machine Learning Techniques
    Asghar, Muhammad Nabeel
    Raza, Muhammad Asif
    Murad, Zara
    Alyahya, Ahmed
    IPSI BGD TRANSACTIONS ON INTERNET RESEARCH, 2024, 20 (01): : 24 - 35