Academic literature on the topic 'Mobile botnet'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Mobile botnet.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Mobile botnet"
Wang, Yichuan, Yefei Zhang, Wenjiang Ji, Lei Zhu, and Yanxiao Liu. "Gleer: A Novel Gini-Based Energy Balancing Scheme for Mobile Botnet Retopology." Wireless Communications and Mobile Computing 2018 (2018): 1–10. http://dx.doi.org/10.1155/2018/7805408.
Full textKarim, Ahmad, Victor Chang, and Ahmad Firdaus. "Android Botnets." Journal of Organizational and End User Computing 32, no. 3 (July 2020): 50–67. http://dx.doi.org/10.4018/joeuc.2020070105.
Full textWu, Min-Hao, Chia-Hao Lee, Fu-Hau Hsu, Kai-Wei Chang, Tsung-Huang Huang, Ting-Cheng Chang, and Li-Min Yi. "Simple and Ingenious Mobile Botnet Covert Network Based on Adjustable Unit (SIMBAIDU)." Mathematical Problems in Engineering 2021 (August 3, 2021): 1–6. http://dx.doi.org/10.1155/2021/9920883.
Full textYerima, Suleiman Y., Mohammed K. Alzaylaee, Annette Shajan, and Vinod P. "Deep Learning Techniques for Android Botnet Detection." Electronics 10, no. 4 (February 23, 2021): 519. http://dx.doi.org/10.3390/electronics10040519.
Full textLi, Na, Yan Hui Du, and Guang Xun Chen. "CPbot: The Construction of Mobile Botnet Using GCM." Applied Mechanics and Materials 635-637 (September 2014): 1526–29. http://dx.doi.org/10.4028/www.scientific.net/amm.635-637.1526.
Full textSun, Fenggang, Lidong Zhai, Yuejin Du, Peng Wang, and Jun Li. "Design of Mobile Botnet Based on Open Service." International Journal of Digital Crime and Forensics 8, no. 3 (July 2016): 1–10. http://dx.doi.org/10.4018/ijdcf.2016070101.
Full textYusof, Muhammad, Madihah Mohd Saudi, and Farida Ridzuan. "Mobile Botnet Classification by using Hybrid Analysis." International Journal of Engineering & Technology 7, no. 4.15 (October 7, 2018): 103. http://dx.doi.org/10.14419/ijet.v7i4.15.21429.
Full textLin, Kuan-Cheng, Sih-Yang Chen, and Jason C. Hung. "Botnet Detection Using Support Vector Machines with Artificial Fish Swarm Algorithm." Journal of Applied Mathematics 2014 (2014): 1–9. http://dx.doi.org/10.1155/2014/986428.
Full textBernardeschi, Cinzia, Francesco Mercaldo, Vittoria Nardone, and Antonella Santone. "Exploiting Model Checking for Mobile Botnet Detection." Procedia Computer Science 159 (2019): 963–72. http://dx.doi.org/10.1016/j.procs.2019.09.263.
Full textJiang, Ruei Min, Jia Sian Jhang, Fu Hau Hsu, Yan Ling Hwang, Pei Wen Huang, and Yung Hoh Sheu. "JokerBot – An Android-Based Botnet." Applied Mechanics and Materials 284-287 (January 2013): 3454–58. http://dx.doi.org/10.4028/www.scientific.net/amm.284-287.3454.
Full textDissertations / Theses on the topic "Mobile botnet"
Vural, Ickin. "Spamming mobile botnet detection using computational intelligence." Diss., University of Pretoria, 2013. http://hdl.handle.net/2263/36775.
Full textDissertation (MSc)--University of Pretoria, 2013.
gm2014
Computer Science
unrestricted
Meng, Xim. "An integrated network-based mobile botnet detection system." Thesis, City, University of London, 2018. http://openaccess.city.ac.uk/19840/.
Full textJensen, David. "Ddos Defense Against Botnets in the Mobile Cloud." Thesis, University of North Texas, 2014. https://digital.library.unt.edu/ark:/67531/metadc500027/.
Full textLiu, En-Bang, and 劉恩榜. "Mobile Botnet Detection on Android." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/72436850018843213186.
Full text國立交通大學
資訊科學與工程研究所
100
Botnets are now a serious threat to the internet . The infected computers will become a puppet (zombie computer), and controlled by attacker unconsciously . This impact not only resulted in leakage of information, system damage , but also make the computers become a springboard for a major network attacks .With the high development of smart phones , the phone is not just for calling or sending messages like before , also contains the ability of surfing the internet and basic processing data ; hence many personal data , passwords , private pictures/videos are stored in the phone. The smart phone has become a mini-PC. So in recent years , many hackers continue to develop viruses , Trojan Horses , bot virus and other malicious software on mobile phones to steal private information , send advertising messages and spam e-mails. Therefore in this paper , we provide a mobile Botnet detection system on Android. Based on the group activities model and abnormal connections metric , installing the Snort IDS to detect real time traffic and the Botnet packet filter to collect abnormal traffic in the frontend. Then upload the abnormal traffic to the detection center . After collecting traffic data from many mobile phones , the center uses similarity algorithms to determine which phone is infected with the bot virus and controlled by attacker.
Pieterse, Heloise. "Design of a hybrid command and control mobile botnet." Diss., 2014. http://hdl.handle.net/2263/41816.
Full textDissertation (MSc)--University of Pretoria, Pretoria 2014
Computer Science
unrestricted
Kitana, Asem. "Impact of mobile botnet on long term evolution networks: a distributed denial of service attack perspective." Thesis, 2021. http://hdl.handle.net/1828/12817.
Full textGraduate
Chia-Wei, Kao, and 高家緯. "An Effective Unknown Botnet Malware Detection Mechanism for Android-based Mobile Devices." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/11971069157005073291.
Full text大葉大學
資訊管理學系碩士班
99
At present, the smart phone system is developing vigorously, in which Android occupies most of the current market share, using the open operating system to provide overall effective applications (APPs) for the users to install. However, while it provides protection, it also brings harms just like a double-edged sword. Some malware may hide in the various Android APPs. This study mainly discusses one of the Android botnets, which abuses the powerful connection function of Android. Its distributed denial of service (DDoS)attacks have the features of the large-scaled botnet, plus the high mobility of the Android mobile device, so it will cause greater harm to the targets than the conventional DDoS attacks, and it is hard to track the attack source. This malware makes the Android connection slower, so that users cannot normally use the network service. What worse, the greater threat is that it blocks the operation of servers; as a result, the uninfected Android smart phones can’t normally access the network services. Nowadays, most of the conventional DDoS detection mechanisms are in the server-end, which can only temporarily relieve the DDoS attacks to stabilize the normal service, but don’t provide effective solution to the Android botnet problems. Furthermore, the conventional detectors are not designed for mobile devices, so its design mechanism is not suitable for the mobile devices with low performance, limited powers and less storage space. Therefore, in order to design an effective detection mechanism to unknown botnet malware, this study first develops a kind of Android botnet malware based on the HTTP Flood attack, which is the most inundant DDoS attack and is hard to detect; meanwhile, it cannot be detected by the well-known anti-virus software tools. Afterward, we further develop a mechanism that cannot only effectively detect a wide variety of unknown botnet malware, but also detect the botnet malware developed in this study. The performance evaluation and analysis reveal the proposed detection mechanism indeed has high detection accuracy, and is superior to the related studies in terms of performance requirements and practical applications. Thus, we affirm the proposed detection mechanism has extremely high practical application value.
LEE, CHIA-HAO, and 李家豪. "CIDP Treatment: An Innovative Mobile Botnet Covert Channel based on Caller IDs with P8 Treatment." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/17943920410701052238.
Full text國立中央大學
資訊工程研究所
99
Nowadays we use a variety of applications on mobile phones or personal computers, and the probability of malware embedding is growing high. If there is not any robust prevention in the future, botnet will penetrate, and then manipulate the user’s mobile phones or computers and seize the authority of control. Mobile phones brought us much convenience, but also the safety of the use on it has been received more attention. In real world, because of the difference of application scenarios, the security mechanism on a personal computer in the past, although some may be directly applied, most likely seems to be no avail in smart phones, for the purpose of use as well as on different architecture. Smart phones (broadly speaking, mobile smart devices) in modern society play an important role. With the applications on the network, smart phones bring the convenience, but also led to many related security issues. This paper presents a possible way, CIDP Treatment, to achieve the control of a mobile botnet by using caller ID numbers as an innovative covert channel. We design an innovative lossless data compression treatment -- Perfect Octave Coding (P8 Coding) for this new covert channel to enhance the efficiency of the data transmission.
Book chapters on the topic "Mobile botnet"
Karim, Ahmad, Syed Adeel Ali Shah, and Rosli Salleh. "Mobile Botnet Attacks: A Thematic Taxonomy." In Advances in Intelligent Systems and Computing, 153–64. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-05948-8_15.
Full textVural, Ickin, and Hein Venter. "Mobile Botnet Detection Using Network Forensics." In Future Internet - FIS 2010, 57–67. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15877-3_7.
Full textBhatia, J. S., R. K. Sehgal, and Sanjeev Kumar. "Honeynet Based Botnet Detection Using Command Signatures." In Advances in Wireless, Mobile Networks and Applications, 69–78. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21153-9_7.
Full textPorras, Phillip, Hassen Saïdi, and Vinod Yegneswaran. "An Analysis of the iKee.B iPhone Botnet." In Security and Privacy in Mobile Information and Communication Systems, 141–52. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-17502-2_12.
Full textŠimon, Marek, Ladislav Huraj, and Marián Hosťovecký. "A Mobile Botnet Model Based on P2P Grid." In Communications in Computer and Information Science, 604–15. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-65551-2_44.
Full textHua, Jingyu, and Kouichi Sakurai. "A SMS-Based Mobile Botnet Using Flooding Algorithm." In Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication, 264–79. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21040-2_19.
Full textDong, Yulong, Jun Dai, and Xiaoyan Sun. "A Mobile Botnet That Meets Up at Twitter." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 3–21. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-01704-0_1.
Full textLi, Na, Yanhui Du, and Guangxuan Chen. "Mobile Botnet Propagation Modeling in Wi-Fi Networks." In Proceedings of the 4th International Conference on Computer Engineering and Networks, 1147–54. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-11104-9_132.
Full textWang, Peng, Chengwei Zhang, Xuanya Li, and Can Zhang. "A Mobile Botnet Model Based on Android System." In Trustworthy Computing and Services, 54–61. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-43908-1_7.
Full textLi, Yue, Lidong Zhai, Zhilei Wang, and Yunlong Ren. "Control Method of Twitter- and SMS-Based Mobile Botnet." In Trustworthy Computing and Services, 644–50. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-35795-4_81.
Full textConference papers on the topic "Mobile botnet"
Choi, Byungha, Sung-Kyo Choi, and Kyungsan Cho. "Detection of Mobile Botnet Using VPN." In 2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS). IEEE, 2013. http://dx.doi.org/10.1109/imis.2013.32.
Full textAlzahrani, Abdullah J., and Ali A. Ghorbani. "SMS-Based Mobile Botnet Detection Module." In 2016 6th International Conference on IT Convergence and Security (ICITCS). IEEE, 2016. http://dx.doi.org/10.1109/icitcs.2016.7740371.
Full textAbdullah, Zubaile, Madihah Mohd Saudi, and Nor Badrul Anuar. "Mobile botnet detection: Proof of concept." In 2014 IEEE 5th Control and System Graduate Research Colloquium (ICSGRC). IEEE, 2014. http://dx.doi.org/10.1109/icsgrc.2014.6908733.
Full textAnwar, Shahid, Jasni Mohamad Zain, Zakira Inayat, Riaz Ul Haq, Ahmad Karim, and Aws Naser Jabir. "A static approach towards mobile botnet detection." In 2016 3rd International Conference on Electronic Design (ICED). IEEE, 2016. http://dx.doi.org/10.1109/iced.2016.7804708.
Full textGuining Geng, Guoai Xu, Miao Zhang, Yixian Yang, and Guang Yang. "An improved SMS based heterogeneous mobile botnet model." In 2011 International Conference on Information and Automation (ICIA). IEEE, 2011. http://dx.doi.org/10.1109/icinfa.2011.5948987.
Full textLiu, Tao, and Kai Zhu. "The Research of Control Mechanism in Mobile Botnet." In 2015 3rd International Conference on Machinery, Materials and Information Technology Applications. Paris, France: Atlantis Press, 2015. http://dx.doi.org/10.2991/icmmita-15.2015.279.
Full textLiao, Ming-Yi, Jynu-Hao Li, Chu-Sing Yang, Min Chen, Chun-Wei Tsai, and Ming-Cho Chang. "Botnet Topology Reconstruction: A Case Study." In 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS). IEEE, 2012. http://dx.doi.org/10.1109/imis.2012.114.
Full textCai, Tao, and Futai Zou. "Detecting HTTP Botnet with Clustering Network Traffic." In 2012 8th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM). IEEE, 2012. http://dx.doi.org/10.1109/wicom.2012.6478491.
Full textAlzahrani, Abdullah J., and Ali A. Ghorbani. "SMS mobile botnet detection using a multi-agent system." In the 1st International Workshop. New York, New York, USA: ACM Press, 2014. http://dx.doi.org/10.1145/2602945.2602950.
Full textZhang, YeFei, Yi Chuan, Wang LeiWang, XinHong Hei, and Guo Xie. "Fairness-power consumption re-topology strategies for mobile botnet." In 2017 International Conference on Electromagnetics in Advanced Applications (ICEAA). IEEE, 2017. http://dx.doi.org/10.1109/iceaa.2017.8065370.
Full text