Filters








159 Hits in 9.9 sec

Cloud-based push-styled mobile botnets

Shuang Zhao, Patrick P. C. Lee, John C. S. Lui, Xiaohong Guan, Xiaobo Ma, Jing Tao
2012 Proceedings of the 28th Annual Computer Security Applications Conference on - ACSAC '12  
We propose a new form of cloud-based push-styled mobile botnets that exploits today's push notification services as a means of command dissemination.  ...  To motivate its practicality, we present a new command and control (C&C) channel using Google's Cloud to Device Messaging (C2DM) service, and develop a C2DM botnet specifically for the Android platform  ...  OVERVIEW OF C2DM We now describe Google's cloud-based push-styled messaging service, or the Cloud to Device Messaging (C2DM) service (as illustrated in Figure 1 ).  ... 
doi:10.1145/2420950.2420968 dblp:conf/acsac/ZhaoLLGMT12 fatcat:bmfaquml4jftnjuxsqevcbw5de

Mobile Botnet Attacks – an Emerging Threat: Classification, Review and Open Issues

2015 KSII Transactions on Internet and Information Systems  
Above all, the capability of botnets is uncovered through a wide range of malicious activities, such as distributed denial of service (DDoS), theft of business information, remote access, online or click  ...  In this study, we investigate mobile botnet attacks by exploring attack vectors and subsequently present a well-defined thematic taxonomy.  ...  Cloud-Based Push-Styled Mobile Botnets [16] is a new type of botnet in the mobile environment that uses push-based notification services to disseminate the commands.  ... 
doi:10.3837/tiis.2015.04.012 fatcat:hq2wtnaxlfhzjl5bd2l6q5dzky

Botnet in DDoS Attacks: Trends and Challenges

Nazrul Hoque, Dhruba K. Bhattacharyya, Jugal K. Kalita
2015 IEEE Communications Surveys and Tutorials  
Botnet based DDoS attacks are catastrophic to the victim network as they can exhaust both network bandwidth and resources of the victim machine.  ...  Furthermore, a list of important issues and research challenges is also reported. Index Terms-DDoS attack, botnet, mobile botnet, IP traceback, DDoS prevention.  ...  [142] discuss how Google's cloud-based C2DM service for the Android platform can potentially be attacked by a cloud-based push-style mobile botnet where push notification service is used as a C&C channel  ... 
doi:10.1109/comst.2015.2457491 fatcat:oph4lgawmzbuvgygq4iagsr6eu

A Survey on Botnets: Incentives, Evolution, Detection and Current Trends

Simon Nam Thanh Vu, Mads Stege, Peter Issam El-Habr, Jesper Bang, Nicola Dragoni
2021 Future Internet  
Botnets have shown a capacity to perform substantial damage through distributed denial-of-service attacks, information theft, spam and malware propagation.  ...  In this paper, a systematic literature review on botnets is presented to the reader in order to obtain an understanding of the incentives, evolution, detection, mitigation and current trends within the  ...  Smartphone services such as Googles Push Notification Service (PNS) is also considered to be exploited by botnet devs as C&C channels [90] .  ... 
doi:10.3390/fi13080198 fatcat:5umqenw47ncdxggi4kiotkeag4

Study of Peer-to-Peer Network Based Cybercrime Investigation: Application on Botnet Technologies [article]

Mark Scanlon
2017 arXiv   pre-print
the use of a variety of worms, botnets, malware, viruses and P2P file sharing.  ...  The scalable, low overhead attributes of Peer-to-Peer (P2P) Internet protocols and networks lend themselves well to being exploited by criminals to execute a large range of cybercrimes.  ...  ACKNOWLEDGEMENTS With no doubt, the work on this thesis has been the most challenging endeavour I have undertaken so far. I am thankful to my supervisor, Prof.  ... 
arXiv:1712.03455v1 fatcat:brkwhni6vza2dm7ristaj5gyoa

Gleer: A Novel Gini-Based Energy Balancing Scheme for Mobile Botnet Retopology

Yichuan Wang, Yefei Zhang, Wenjiang Ji, Lei Zhu, Yanxiao Liu
2018 Wireless Communications and Mobile Computing  
In this paper, we try to design a novel Gini-based energy balancing scheme (Gleer) for the atomic network, which is a fundamental component of the heterogeneous multilayer mobile botnet.  ...  Mobile botnet has recently evolved due to the rapid growth of smartphone technologies.  ...  Acknowledgments This paper is supported by the National Natural Science  ... 
doi:10.1155/2018/7805408 fatcat:2kzrbmto2vaqlhkghnbvbiwzoq

Brain leaks and consumer neurotechnology

Marcello Ienca, Pim Haselager, Ezekiel J Emanuel
2018 Nature Biotechnology  
Cloud Vulnerabilities It is not necessarily the case that cloud systems are inherently less-secure than traditional IT services.  ...  Both examples highlight a clear-cut case of terrorists using cyberthreats as an instrument to amplify their messages.  ...  T Device control settings that prevent and limit the types of USB devices to be used.  ... 
doi:10.1038/nbt.4240 pmid:30188521 fatcat:dwoyvyborfdifdkklju3p3qek4

D5.7 Market Analysis and Exploitation - second year report

Vanessa Clemente, Tomás García, Arturo Medela, Orfefs Voutyras, George Palaiokrassas, Koumoto Takafumi, Akira Tsuge, Tadashi Okoshi, Jin Nakasawa, Aamir Bokhari, Kenji Tei, Keiko Doguchi (+2 others)
2020 Zenodo  
Report detailing the activities performed so far regarding market analysis and plans/reports for exploitation planning related activities.  ...  There is a very high possibility of pushing it up to a dimension that is not in the market.  ...  The same practice is employed with mobile, web and cloud applications and services used to access, manage and process data associated with M-Sec IoT devices.  ... 
doi:10.5281/zenodo.4237450 fatcat:h6dagn7pcndojcbnfuige2hbn4

Webinos Project Deliverable: Phase 2 Security Framework

Webinos Consortium
2012 Zenodo  
It provides a set of recommendations and describes the outstanding weaknesses and issues of which webinos stakeholders may need to be aware.  ...  The webinos project defines and delivers an open source web application runtime compatible with a wide range of smart devices, including smartphones, tablets, PCs, in-car systems and set-top boxes.  ...  using real-world case studies, e.g.  ... 
doi:10.5281/zenodo.1147031 fatcat:x53nqshe7jfqrnbq6urpvsj2ra

Security issues in cloud environments: a survey

Diogo A. B. Fernandes, Liliana F. B. Soares, João V. Gomes, Mário M. Freire, Pedro R. M. Inácio
2013 International Journal of Information Security  
Regardless of its advantages, the transition to this computing paradigm raises security concerns, which are the subject of several studies.  ...  Besides of the issues derived from web technologies and the Internet, clouds introduce new issues that should be cleared out first in order to further allow the number of cloud deployments to increase.  ...  Acknowledgements We would like to thank all the anonymous reviewers for constructively criticizing this work.  ... 
doi:10.1007/s10207-013-0208-7 fatcat:55o67epb6zfspchxuzvuduzr4a

Harnessing Artificial Intelligence Capabilities to Improve Cybersecurity

Sherali Zeadally, Erwin Adi, Zubair Baig, Imran Khan
2020 IEEE Access  
Cybersecurity is a fast-evolving discipline that is always in the news over the last decade, as the number of threats rises and cybercriminals constantly endeavor to stay a step ahead of law enforcement  ...  We also discuss future research opportunities associated with the development of AI techniques in the cybersecurity field across a range of application domains.  ...  ACKNOWLEDGMENT The authors would like to thank the anonymous reviewers for their valuable comments and suggestions which helped us improve the content, quality, and presentation of this paper.  ... 
doi:10.1109/access.2020.2968045 fatcat:tb6xkdqqhfcahb5soip66x5qce

Verticals in 5G MEC -use cases and security challenges

Tomasz W. Nowak, Mariusz Sepczuk, Zbigniew Kotulski, Wojciech Niewolski, Rafal Artych, Krzysztof Bocianiak, Tomasz Osko, Jean-Philippe Wary
2021 IEEE Access  
Paper [191] refers to a solution in which players' mobile devices can offload particular game tasks to a server or neighboring mobile devices.  ...  The response might be finally faster than in a cloud-based scenario. • The edge server can cause the traffic from user devices (e.g., sensors) to be consolidated in the edge server and then sent to the  ... 
doi:10.1109/access.2021.3088374 fatcat:ocvx3fwqendxlmpk7iekehwvb4

On lightweight mobile phone application certification

William Enck, Machigar Ongtang, Patrick McDaniel
2009 Proceedings of the 16th ACM conference on Computer and communications security - CCS '09  
In this paper, we propose the Kirin security service for Android, which performs lightweight certification of applications to mitigate malware at install time.  ...  We use a variant of security requirements engineering techniques to perform an in-depth security analysis of Android to produce a set of rules that match malware characteristics.  ...  We also thank Adam Smith for his feedback while designing the logic. Finally, we thank the SIIS lab as a whole for their continual feedback during the writing of this paper.  ... 
doi:10.1145/1653662.1653691 dblp:conf/ccs/EnckOM09 fatcat:mok4kzcapnbtlbrdthsm37bxg4

D2.1 Vision, State of the Art and Requirements Analysis

Striccoli Domenico
2019 Zenodo  
The main objectives of this deliverable are (i) to describe the project vision, the applicability scenarios, and demonstration use cases; (ii) to perform an analysis of the State of the Art and current  ...  market solutions; (iii) to identify and describe the technical and architectural requirements of the GUARD framework.  ...  Data Push Push APIs provide applications the ability to get messages from a server. This allows asynchronous messages to be sent to applications.  ... 
doi:10.5281/zenodo.3564301 fatcat:lrb6r6zat5bk5oqwpwwlui3ztm

State of the Software Development Life-Cycle for the Internet-of-Things [article]

João Pedro Dias, Hugo Sereno Ferreira
2018 arXiv   pre-print
The explosion of Internet-connected devices, Internet-of-Things, adds to the complexity of software systems.  ...  Software has a longstanding association with a state of crisis considering its success rate.  ...  One of the most recent events that have resulted from the lack of security in the IoT is the case of Mirai botnet [Sicari et al. 2015] .  ... 
arXiv:1811.04159v1 fatcat:hejb5s34e5f4jm3lc6vwahulr4
« Previous Showing results 1 — 15 out of 159 results