TY - GEN
T1 - Malicious attacks in Mobile Device Clouds
T2 - 2014 23rd International Conference on Computer Communication and Networks, ICCCN 2014
AU - Mtibaa, Abderrahmen
AU - Harras, Khaled A.
AU - Alnuweiri, Hussein
N1 - Publisher Copyright:
© 2014 IEEE.
PY - 2014/9/25
Y1 - 2014/9/25
N2 - Mobile Device Clouds are becoming a reality with the quantitative and qualitative upgrades on mobile devices such as smart-phones and tablets. This proliferation renders mobile devices capable of initiating sophisticated cyberattacks especially when they coordinate together and form a distributed mobile botnets which we call 'MobiBots'. MobiBots infect a large number of mobile devices and schedule targeted attacks by leveraging device-to-device (d2d) short range wireless communications. In this work, we first introduce MobiBots, the formation of MobiBots, their challenges, and limitations. We then make the case for MobiBots utilization. We show the potential for and impact of the large scale infection and coordination of mobile devices via short range wireless technologies in attacks against other mobile devices that come within proximity. We show that MobiBots are difficult to detect and isolate compared to common botnets. However, prevention techniques cost at least 40% of the network capacity.
AB - Mobile Device Clouds are becoming a reality with the quantitative and qualitative upgrades on mobile devices such as smart-phones and tablets. This proliferation renders mobile devices capable of initiating sophisticated cyberattacks especially when they coordinate together and form a distributed mobile botnets which we call 'MobiBots'. MobiBots infect a large number of mobile devices and schedule targeted attacks by leveraging device-to-device (d2d) short range wireless communications. In this work, we first introduce MobiBots, the formation of MobiBots, their challenges, and limitations. We then make the case for MobiBots utilization. We show the potential for and impact of the large scale infection and coordination of mobile devices via short range wireless technologies in attacks against other mobile devices that come within proximity. We show that MobiBots are difficult to detect and isolate compared to common botnets. However, prevention techniques cost at least 40% of the network capacity.
UR - http://www.scopus.com/inward/record.url?scp=84908200506&partnerID=8YFLogxK
U2 - 10.1109/ICCCN.2014.6911812
DO - 10.1109/ICCCN.2014.6911812
M3 - Conference contribution
AN - SCOPUS:84908200506
T3 - Proceedings - International Conference on Computer Communications and Networks, ICCCN
BT - 2014 23rd International Conference on Computer Communication and Networks, ICCCN Proceedings
PB - Institute of Electrical and Electronics Engineers Inc.
Y2 - 4 August 2014 through 7 August 2014
ER -