From Botnets to MobiBots: A Novel Malicious Communication Paradigm for Mobile Botnets

被引:6
|
作者
Mtibaa, Abderrahmen [1 ]
Harras, Khaled A. [2 ]
Alnuweiri, Hussein [1 ]
机构
[1] Texas A&M Univ, College Stn, TX 77843 USA
[2] Carnegie Mellon Univ, Pittsburgh, PA 15213 USA
关键词
D O I
10.1109/MCOM.2015.7180509
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cyber security is moving from traditional infrastructure to sophisticated mobile infrastructureless threats. A major concern is that such imminent transition is happening at a rate far exceeding the evolution of security solutions. In fact, the transformation of mobile devices into highly capable computing platforms makes the possibility of security attacks originating from within the mobile network a reality. Today, mobile devices are capable of initiating sophisticated cyberattacks, especially when they coordinate together to form what we call a MobiBot. MobiBots differ from classical botnets in that they exploit mobile operating system vulnerabilities and the advantages of device-to-device communication to mask malicious code propagation.
引用
收藏
页码:61 / 67
页数:7
相关论文
共 50 条
  • [41] Can We Beat Legitimate Cyber Behavior Mimicking Attacks from Botnets?
    Yu, Shui
    Guo, Song
    Stojmenovic, Ivan
    2012 PROCEEDINGS IEEE INFOCOM, 2012, : 2851 - 2855
  • [42] GADFly: A Fast and Robust Algorithm to Detect P2P Botnets in Communication Graphs
    Joshi, Harshvardhan P.
    Dutta, Rudra
    2018 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2018,
  • [43] FROM CYBERCRIME TO CYBORG CRIME: BOTNETS AS HYBRID CRIMINAL ACTOR-NETWORKS
    van der Wagen, Wytske
    Pieters, Wolter
    BRITISH JOURNAL OF CRIMINOLOGY, 2015, 55 (03): : 578 - 595
  • [44] DeBot: A novel network-based mechanism to detect exfiltration by architectural stealthy botnets
    Venkatesan, Sridhar
    Albanese, Massimiliano
    Chiang, Cho-Yu Jason
    Sapello, Angelo
    Chadha, Ritu
    SECURITY AND PRIVACY, 2018, 1 (06):
  • [45] A novel method of mining network flow to detect P2P botnets
    Lin, Shu-Chiung
    Chen, Patrick S.
    Chang, Chia-Ching
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2014, 7 (04) : 645 - 654
  • [46] A novel method of mining network flow to detect P2P botnets
    Shu-Chiung Lin
    Patrick S. Chen
    Chia-Ching Chang
    Peer-to-Peer Networking and Applications, 2014, 7 : 645 - 654
  • [47] IRC botnets' homology identifying method based on dynamic time warping distance of communication feature curves
    Jin, Xin
    Li, Runheng
    Gan, Liang
    Li, Zhengyi
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2012, 49 (03): : 481 - 490
  • [48] Mozi IoT Malware and Its Botnets: From Theory To Real-World Observations
    Sahota, Josh
    Vlajic, Natalija
    2021 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI 2021), 2021, : 698 - 703
  • [49] IRC botnets' homology identifying method based on improved LB_PAA distance of communication characteristic curves
    Jia, Yan
    Li, Runheng
    Gan, Liang
    Chen, Guangqiang
    2010 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY AND SECURITY INFORMATICS (IITSI 2010), 2010, : 360 - 365
  • [50] Proactive Detection of Botnets with Intended Forceful Infections from Multiple Malware Collecting Channels
    Moon, Young Hoon
    Kim, Huy Kong
    FUTURE INFORMATION TECHNOLOGY, PT 1, 2011, 184 : 29 - 36