Malicious attacks in Mobile Device Clouds: A data driven risk assessment

Abderrahmen Mtibaa*, Khaled A. Harras, Hussein Alnuweiri

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

8 Citations (Scopus)

Abstract

Mobile Device Clouds are becoming a reality with the quantitative and qualitative upgrades on mobile devices such as smart-phones and tablets. This proliferation renders mobile devices capable of initiating sophisticated cyberattacks especially when they coordinate together and form a distributed mobile botnets which we call 'MobiBots'. MobiBots infect a large number of mobile devices and schedule targeted attacks by leveraging device-to-device (d2d) short range wireless communications. In this work, we first introduce MobiBots, the formation of MobiBots, their challenges, and limitations. We then make the case for MobiBots utilization. We show the potential for and impact of the large scale infection and coordination of mobile devices via short range wireless technologies in attacks against other mobile devices that come within proximity. We show that MobiBots are difficult to detect and isolate compared to common botnets. However, prevention techniques cost at least 40% of the network capacity.

Original languageEnglish
Title of host publication2014 23rd International Conference on Computer Communication and Networks, ICCCN Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781479935727
DOIs
Publication statusPublished - 25 Sept 2014
Externally publishedYes
Event2014 23rd International Conference on Computer Communication and Networks, ICCCN 2014 - Shanghai, China
Duration: 4 Aug 20147 Aug 2014

Publication series

NameProceedings - International Conference on Computer Communications and Networks, ICCCN
ISSN (Print)1095-2055

Conference

Conference2014 23rd International Conference on Computer Communication and Networks, ICCCN 2014
Country/TerritoryChina
CityShanghai
Period4/08/147/08/14

Fingerprint

Dive into the research topics of 'Malicious attacks in Mobile Device Clouds: A data driven risk assessment'. Together they form a unique fingerprint.

Cite this