Due to their limited capabilities, mobile devices have rarely been adopted as attack vectors. In this paper, we consider the execution of coordinated and distributed attacks perpetrated by mobile devices (mobile botnet). We first describe current botnets architectures, analyzing their strengths and weaknesses. Then, we identify problems deriving from the development of a mobile botnet. Appropriate solutions to such problems have been proposed, thus providing an important resource during design and development stages of a mobile botnet
The proliferation of mobile devices with increased capabilities and the widespread penetration of wi...
Part 8: Security AttacksInternational audienceAs a lot of sophisticated duties are being migrated to...
The vast expansion of interconnectivity with the Internet and the rapid evolution of highly-capable ...
Abstract. Botnets represent a serious security threat on the Inter-net. Current security mechanism a...
The current mobile devices have become smart and are increasingly being used for conducting business...
ABSTRACT-As most applications in wired networks become available on mobile devices and mobile networ...
With the proliferation of mobile devices of advanced capabilities and the establishment of wireless ...
Malicious software (malware) infects large numbers of mobile devices. Once infected these mobile dev...
Mobile botnets are an emerging security threat that aims at exploiting the wide penetration of mobil...
Abstract—A botnet in mobile networks is a collection of compromised nodes due to mobile malware, whi...
The proliferation of mobile devices with increased capabilities and the widespread penetration of wi...
Part 8: Security AttacksInternational audienceAs a lot of sophisticated duties are being migrated to...
The vast expansion of interconnectivity with the Internet and the rapid evolution of highly-capable ...
Abstract. Botnets represent a serious security threat on the Inter-net. Current security mechanism a...
The current mobile devices have become smart and are increasingly being used for conducting business...
ABSTRACT-As most applications in wired networks become available on mobile devices and mobile networ...
With the proliferation of mobile devices of advanced capabilities and the establishment of wireless ...
Malicious software (malware) infects large numbers of mobile devices. Once infected these mobile dev...
Mobile botnets are an emerging security threat that aims at exploiting the wide penetration of mobil...
Abstract—A botnet in mobile networks is a collection of compromised nodes due to mobile malware, whi...
The proliferation of mobile devices with increased capabilities and the widespread penetration of wi...
Part 8: Security AttacksInternational audienceAs a lot of sophisticated duties are being migrated to...
The vast expansion of interconnectivity with the Internet and the rapid evolution of highly-capable ...