Filters








183 Hits in 6.3 sec

Android Botnets

Ahmad Karim, Victor Chang, Ahmad Firdaus
2020 Journal of Organizational and End User Computing  
In this article, the authors have proposed a hybrid analysis framework combining static and dynamic analysis as a proof of concept, to highlight and confirm botnet phenomena in Android-based mobile applications  ...  Mobile botnets are gaining popularity with the expressive demand of smartphone technologies. Similarly, the majority of mobile botnets are built on a popular open source OS, e.g., Android.  ...  DroidRanger (Liang & Du, 2014) , a hybrid analysis approach in which the app binaries are shortlistedbasedontheusageofdangerouspermissionset.Further,themaliciousbehavioriscompared withexistingmalware'sbehaviorbylookingintothemanifest  ... 
doi:10.4018/joeuc.2020070105 fatcat:tmhn2kz5k5fhtcjcxeqqxismay

Model-Based Framework for exploiting sensors of IoT devices using a Botnet: A case study with Android [article]

Zubair Khaliq, Dawood Ashraf Khan, Asif Iqbal Baba, Shahbaz Ali, Sheikh Umar Farooq
2022 arXiv   pre-print
Furthermore, proof of concept Botnet is implemented and explained using the developed framework.  ...  In this paper, we design and describe a modular botnet framework for IoT.  ...  Enumeration of Commands Executed This enumeration provided us with an analysis of the permission mechanism of Android devices.  ... 
arXiv:2201.05399v1 fatcat:xr3qlbalbbdirnasmvfgmevmme

A Collaborative Approach to Botnet Protection [chapter]

Matija Stevanovic, Kasper Revsbech, Jens Myrup Pedersen, Robin Sharp, Christian Damsgaard Jensen
2012 Lecture Notes in Computer Science  
Many novel classes of botnets (P2P, hybrid P2P), however, do not require a DNS service for their functioning so these approaches have a significantly limited detection scope.  ...  Detection of malicious traffic in core networks is not a new concept.  ... 
doi:10.1007/978-3-642-32498-7_47 fatcat:vddoswvidrhavgfabfimppb4eq

Cloud-based push-styled mobile botnets

Shuang Zhao, Patrick P. C. Lee, John C. S. Lui, Xiaohong Guan, Xiaobo Ma, Jing Tao
2012 Proceedings of the 28th Annual Computer Security Applications Conference on - ACSAC '12  
To motivate its practicality, we present a new command and control (C&C) channel using Google's Cloud to Device Messaging (C2DM) service, and develop a C2DM botnet specifically for the Android platform  ...  We propose a new form of cloud-based push-styled mobile botnets that exploits today's push notification services as a means of command dissemination.  ...  As a proof of concept, we consider Google's C2DM service for the Android platform, and realize a cloud-based pushstyled mobile botnet using the push notification service as a C&C channel.  ... 
doi:10.1145/2420950.2420968 dblp:conf/acsac/ZhaoLLGMT12 fatcat:bmfaquml4jftnjuxsqevcbw5de

SMS-Based Mobile Botnet Detection Framework Using Intelligent Agents

Abdullah J. Alzahrani, Ali A. Ghorbani
2017 Journal of Cyber Security and Mobility  
Along with increasing security measures in Android platforms, the amount of Android malware that use remote exploits has grown significantly.  ...  By using proactive approaches such as a multi-agent system, agents can monitor certain environments and report abnormal behaviour in order to protect user data.  ...  The concept of adapting a multi-agent approach to Smartphones is a very new area of research that focuses on the Android platform.  ... 
doi:10.13052/jcsm2245-1439.523 fatcat:dkxeklymibgldpjr5fb6oebo3y

Android malware attacks and countermeasures: Current and future directions

Rahul Raveendranath, Venkiteswaran Rajamani, Anoop Joseph Babu, Soumya Kanti Datta
2014 2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)  
Then a detailed analysis of one of the proposed novel malware methods is explained. Finally the paper concludes by summarizing the paper.  ...  The paper also reports a novel method for malware development and novel attack techniques such as mobile botnets, usage pattern based attacks and repackaging attacks.  ...  Android malware with kernel-level rootkit has been demonstrated as a proof-of-concept already 3 .  ... 
doi:10.1109/iccicct.2014.6992944 fatcat:ug2xt52eifapnof3afl6anyika

A Survey on Android Malware Detection Techniques

Rubata RIASAT, Muntaha SAKEENA, Chong WANG, Abdul Hannan SADIQ, Yong-ji WANG
2017 DEStech Transactions on Computer Science and Engineering  
Android Operating Systems are most commonly used systems in the smartphones.  ...  Now-a-days widely applicable smart phone application adoption and rapid growth of contextually sensitive nature of smartphone devices has led to a renaissance in mobile application services and increased  ...  Acknowledgement This research was financially supported by the National Natural Science Foundation of China (61170072) and the National Science Foundation for Young Scientists of China under Grant (61303057  ... 
doi:10.12783/dtcse/wcne2016/5088 fatcat:umen353condztdgf77w4agvngq

Botnet in DDoS Attacks: Trends and Challenges

Nazrul Hoque, Dhruba K. Bhattacharyya, Jugal K. Kalita
2015 IEEE Communications Surveys and Tutorials  
A detailed discussion of several botnet architectures, tools developed using botnet architectures, and pros and cons analysis are also included.  ...  Botnets pose a major threat to network security as they are widely used for many Internet crimes such as DDoS attacks, identity theft, email spamming, and click fraud.  ...  [77] using the concept of document popularity.  ... 
doi:10.1109/comst.2015.2457491 fatcat:oph4lgawmzbuvgygq4iagsr6eu

Social Networking for Botnet Command and Control

Ashutosh Singh, Annie H. Toderici, Kevin Ross, Mark Stamp
2013 International Journal of Computer Network and Information Security  
This botnet is only intended as a proof of concept and it does not perform any malicious actions. ACKNOWLEDGMENTS  ...  A botnet is a group of compromised computers which is often a large group under the command and control of a malicious user, known as a botmaster.  ...  The centralized structure has been used traditionally and, more recently, we see command and control botnets such as Proof-of-Concept (POC) Android botnet [48] , AgoBot [22] , SpyBot [2] , GTBot [2  ... 
doi:10.5815/ijcnis.2013.06.02 fatcat:eofvnhs7gjaefooepbl7idepui

Design of SMS commanded-and-controlled and P2P-structured mobile botnets

Yuanyuan Zeng, Kang G. Shin, Xin Hu
2012 Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks - WISEC '12  
Although botnets have not yet caused major outbreaks in mobile networks, with the rapidly-growing popularity of smartphones such as Apple's iPhone and Android-based phones that store more personal data  ...  Botnets have become one of the most serious security threats to the Internet and personal computer (PC) users.  ...  MOBILE BOTNET DESIGN We now present the detailed design of a proof-of-concept mobile botnet.  ... 
doi:10.1145/2185448.2185467 dblp:conf/wisec/ZengSH12 fatcat:q4ykziczbve2ndzfsfegvfc7s4

Study of Peer-to-Peer Network Based Cybercrime Investigation: Application on Botnet Technologies [article]

Mark Scanlon
2017 arXiv   pre-print
the use of a variety of worms, botnets, malware, viruses and P2P file sharing.  ...  A proof of concept tool was developed for conducting investigations on the BitTorrent network.  ...  A proof of concept tool xv was developed for conducting investigations on the BitTorrent network.  ... 
arXiv:1712.03455v1 fatcat:brkwhni6vza2dm7ristaj5gyoa

Design and Analysis of Push Notification-Based Malware on Android

Sangwon Hyun, Junsung Cho, Geumhwan Cho, Hyoungshick Kim
2018 Security and Communication Networks  
We implemented a backdoor prototype on Android devices as a proof-of-concept of the push notification-based malware and evaluated its stealthiness and feasibility.  ...  The use of push notification services as covert channels makes it difficult to distinguish this type of malware from other normal applications also using the same services.  ...  [10] proposed mobile botnets that use a hybrid of SMS, HTTP, and/or Bluetooth as a C&C medium.  ... 
doi:10.1155/2018/8510256 fatcat:uollculdf5ftvln2xcqyc5wiei

Evaluating Bluetooth as a Medium for Botnet Command and Control [chapter]

Kapil Singh, Samrit Sangal, Nehil Jain, Patrick Traynor, Wenke Lee
2010 Lecture Notes in Computer Science  
While such attention has previously focused on viruses and worms, many of which use near-field communications in order to propagate, none have investigated whether more complex malware such as botnets  ...  In so doing, we demonstrate that mobile phone-based botnets are a realistic threat and that defensive strategies should be modified to consider them.  ...  Experimental Goals We use our proof-of-concept bot to evaluate various parameters that directly or indirectly impact command propagation in a mobile phone-based botnet.  ... 
doi:10.1007/978-3-642-14215-4_4 fatcat:y6j7d7qd4nginhxehtq6qktqly

Internet of Things Botnet Detection Approaches: Analysis and Recommendations for Future Research

Majda Wazzan, Daniyal Algazzawi, Omaima Bamasaq, Aiiad Albeshri, Li Cheng
2021 Applied Sciences  
This research procedure was used to create a source of foundational knowledge of IoT botnet detection methods.  ...  Thus, this study aimed to identify, assess and provide a thoroughly review of experimental works on the research relevant to the detection of IoT botnets.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/app11125713 fatcat:d56mns6avfhwtk4rqkwxoomoqi

Malware Analysis in IoT & Android Systems with Defensive Mechanism

Chandra Shekhar Yadav, Jagendra Singh, Aruna Yadav, Himansu Sekhar Pattanayak, Ravindra Kumar, Arfat Ahmad Khan, Mohd Anul Haq, Ahmed Alhussen, Sultan Alharby
2022 Electronics  
This article attempts to provide a relative analysis of several malware detection methods in the different environments of attacks.  ...  Due to the escalated growth of Android devices, users are facing cybercrime through their Android devices. This article aims to provide a comprehensive study of the IoT and Android systems.  ...  Conflicts of Interest: The authors declare that they have no conflict of interest. Ethical Approval: This article does not contain any studies with human participants performed by any of the authors.  ... 
doi:10.3390/electronics11152354 fatcat:saf2a2bb6rdznkbgdukxb3s4fe
« Previous Showing results 1 — 15 out of 183 results