This poster deals with botnets, the most dangerous kind of mobile malware, and their detection using neural networks. Unlike common mobile malware, botnets often have a complicated pattern of behavior because they are not managed by predictable algorithms but they are controlled by humans via command and control servers (C&C servers) or via peer-to-peer networks. However, they have certain common features which have been revealed by analysis of contemporary mobile botnets. These features have been used for creation of a neural network training set. Finally, the design of parallel architecture using neural network for useful detection of mobile botnets has been described. © 2016 IEEE.ERDF, European Regional Development FundMinistry of Educat...
The advancements in the Internet has enabled connecting more devices into this technology every day....
The advancements in the Internet has enabled connecting more devices into this technology every day....
<p>Botnets are emerging as the most serious threat against cyber-security as they provide a<br>distr...
Many bot-based attacks have been recorded globally in recent years. To carry out their harmful actio...
Botnet represent a critical threat to computer networks because their behavior allows hackers to tak...
Botnet attacks and the various techniques of propagation has constantly been a tricky challenge for ...
Abstract: Malicious software (malware) infects large numbers of mobile devices. Once infected these ...
Android devices can now offer a wide range of services. They support a variety of applications, incl...
otnets are vectors through which hackers can seize control of multiple systems and conduct malicious...
Android, being the most widespread mobile operating systems is increasingly becoming a target for ma...
The use of mobile devices, including smartphones, tablets, smart watches and notebooks are increasin...
A botnet is a malware program that a hacker remotely controls called a botmaster. Botnet can perform...
Mobile botnet phenomenon is gaining popularity among malware writers in order to exploit vulnerabili...
Botnets—vast collections of compromised computers (i.e., bots) under the control of botmasters—have ...
As the use of mobile devices spreads dramatically, hackers have started making use of mobile botnets...
The advancements in the Internet has enabled connecting more devices into this technology every day....
The advancements in the Internet has enabled connecting more devices into this technology every day....
<p>Botnets are emerging as the most serious threat against cyber-security as they provide a<br>distr...
Many bot-based attacks have been recorded globally in recent years. To carry out their harmful actio...
Botnet represent a critical threat to computer networks because their behavior allows hackers to tak...
Botnet attacks and the various techniques of propagation has constantly been a tricky challenge for ...
Abstract: Malicious software (malware) infects large numbers of mobile devices. Once infected these ...
Android devices can now offer a wide range of services. They support a variety of applications, incl...
otnets are vectors through which hackers can seize control of multiple systems and conduct malicious...
Android, being the most widespread mobile operating systems is increasingly becoming a target for ma...
The use of mobile devices, including smartphones, tablets, smart watches and notebooks are increasin...
A botnet is a malware program that a hacker remotely controls called a botmaster. Botnet can perform...
Mobile botnet phenomenon is gaining popularity among malware writers in order to exploit vulnerabili...
Botnets—vast collections of compromised computers (i.e., bots) under the control of botmasters—have ...
As the use of mobile devices spreads dramatically, hackers have started making use of mobile botnets...
The advancements in the Internet has enabled connecting more devices into this technology every day....
The advancements in the Internet has enabled connecting more devices into this technology every day....
<p>Botnets are emerging as the most serious threat against cyber-security as they provide a<br>distr...