A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
Mobile Botnet Attacks – an Emerging Threat: Classification, Review and Open Issues
2015
KSII Transactions on Internet and Information Systems
The rapid development of smartphone technologies have resulted in the evolution of mobile botnets. ...
By identifying the significant parameters from the taxonomy, we compared the effects of existing mobile botnets on commercial platforms as well as open source mobile operating system platforms. ...
P2P-and SMS-based Mobile Botnet
:In consideration of the technological advancements in mobile computing, smartphone vendors are introducing OS that offer competitive features with respect to the traditional ...
doi:10.3837/tiis.2015.04.012
fatcat:hq2wtnaxlfhzjl5bd2l6q5dzky
Botnet in DDoS Attacks: Trends and Challenges
2015
IEEE Communications Surveys and Tutorials
Index Terms-DDoS attack, botnet, mobile botnet, IP traceback, DDoS prevention. ...
A detailed discussion of several botnet architectures, tools developed using botnet architectures, and pros and cons analysis are also included. ...
Some Mobile Botnets In this section we present several mobile botnets and discuss their characteristics. 1) Andbot: This mobile botnet is known for three important features: stealth, resilience and low-cost ...
doi:10.1109/comst.2015.2457491
fatcat:oph4lgawmzbuvgygq4iagsr6eu
9-1-1 DDoS: Threat, Analysis and Mitigation
[article]
2016
arXiv
pre-print
Distributed denial of service (DDoS) attacks launched from a mobile phone botnet pose a significant threat to the availability of this vital service. ...
A rootkit placed within the baseband firmware of a mobile phone can mask and randomize all cellular identifiers, causing the device to have no genuine identification within the cellular network. ...
In 2011 Taining el al presented "Andbot," a stealthy, resilient, and low-cost botnet designed for smartphones [14] . ...
arXiv:1609.02353v1
fatcat:h5f5udk4yjevbmrfub7yvpj65e
Evolution, Detection and Analysis of Malware for Smart Devices
2014
IEEE Communications Surveys and Tutorials
Even though important advances have been made on malware detection in traditional personal computers during the last decades, adopting and adapting those techniques to smart devices is a challenging problem ...
Android/Andbot [106] introduced a new energy-aware C&C strategy named URL Flux for ANDROID OS botnets. ...
[103] were among the first to study the potential theoretical impact of mobile-phone botnets in cellular networks. ...
doi:10.1109/surv.2013.101613.00077
fatcat:u7qjrw4grvcorjjmy3ykddjeda