From Botnets to MobiBots: A Novel Malicious Communication Paradigm for Mobile Botnets

被引:6
|
作者
Mtibaa, Abderrahmen [1 ]
Harras, Khaled A. [2 ]
Alnuweiri, Hussein [1 ]
机构
[1] Texas A&M Univ, College Stn, TX 77843 USA
[2] Carnegie Mellon Univ, Pittsburgh, PA 15213 USA
关键词
D O I
10.1109/MCOM.2015.7180509
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cyber security is moving from traditional infrastructure to sophisticated mobile infrastructureless threats. A major concern is that such imminent transition is happening at a rate far exceeding the evolution of security solutions. In fact, the transformation of mobile devices into highly capable computing platforms makes the possibility of security attacks originating from within the mobile network a reality. Today, mobile devices are capable of initiating sophisticated cyberattacks, especially when they coordinate together to form what we call a MobiBot. MobiBots differ from classical botnets in that they exploit mobile operating system vulnerabilities and the advantages of device-to-device communication to mask malicious code propagation.
引用
收藏
页码:61 / 67
页数:7
相关论文
共 50 条
  • [21] SMSBotHunter: A Novel Anomaly Detection Technique to Detect SMS Botnets
    Faghihi, Farnood
    Abadi, Mahdi
    Tajoddin, Asghar
    2018 15TH INTERNATIONAL ISC (IRANIAN SOCIETY OF CRYPTOLOGY) CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2018,
  • [22] Cloud-based Mobile Botnets Using Multiple Push Servers
    Chen, Wei
    Yin, Chengyu
    Zhou, Shiwen
    Yan, Xiaoshuang
    2015 SEVENTH INTERNATIONAL SYMPOSIUM ON PARALLEL ARCHITECTURES, ALGORITHMS AND PROGRAMMING (PAAP), 2015, : 183 - 189
  • [23] A Novel Reputation System to Detect DGA-Based Botnets
    Sharifnya, Reza
    Abadi, Mahdi
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON COMPUTER AND KNOWLEDGE ENGINEERING (ICCKE 2013), 2013, : 417 - 423
  • [24] An Adaptive Push-Styled Command and Control Mechanism in Mobile Botnets
    CHEN Wei
    GONG Peihua
    YU Le
    YANG Geng
    Wuhan University Journal of Natural Sciences, 2013, 18 (05) : 427 - 434
  • [25] Detecting Mobile Botnets Through Machine Learning and System Calls Analysis
    da Costa, Victor G. T.
    Barbon Junior, Sylvio
    Miani, Rodrigo S.
    Rodrigues, Joel J. P. C.
    Zarpelao, Bruno B.
    2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2017,
  • [26] Detecting and confronting flash attacks from IoT botnets
    C. U. Om Kumar
    Ponsy R. K. Sathia Bhama
    The Journal of Supercomputing, 2019, 75 : 8312 - 8338
  • [27] UCAM: Usage, Communication and Access Monitoring Based Detection System for IoT Botnets
    Sajjad, Syed Muhammad
    Yousaf, Muhammad
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 1547 - 1550
  • [28] Detecting and confronting flash attacks from IoT botnets
    Kumar, C. U. Om
    Bhama, Ponsy R. K. Sathia
    JOURNAL OF SUPERCOMPUTING, 2019, 75 (12): : 8312 - 8338
  • [29] Economics of Fighting Botnets: Lessons from a Decade of Mitigation
    Asghari, Hadi
    van Eeten, Michel J. G.
    Bauer, Johannes M.
    IEEE SECURITY & PRIVACY, 2015, 13 (05) : 16 - 23
  • [30] Mobile botnets meet social networks: design and analysis of a new type of botnet
    Faghani, Mohammad R.
    Nguyen, Uyen T.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2019, 18 (04) : 423 - 449