Letteratura scientifica selezionata sul tema "Mobile botnet"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Consulta la lista di attuali articoli, libri, tesi, atti di convegni e altre fonti scientifiche attinenti al tema "Mobile botnet".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Articoli di riviste sul tema "Mobile botnet"
Wang, Yichuan, Yefei Zhang, Wenjiang Ji, Lei Zhu e Yanxiao Liu. "Gleer: A Novel Gini-Based Energy Balancing Scheme for Mobile Botnet Retopology". Wireless Communications and Mobile Computing 2018 (2018): 1–10. http://dx.doi.org/10.1155/2018/7805408.
Testo completoKarim, Ahmad, Victor Chang e Ahmad Firdaus. "Android Botnets". Journal of Organizational and End User Computing 32, n. 3 (luglio 2020): 50–67. http://dx.doi.org/10.4018/joeuc.2020070105.
Testo completoWu, Min-Hao, Chia-Hao Lee, Fu-Hau Hsu, Kai-Wei Chang, Tsung-Huang Huang, Ting-Cheng Chang e Li-Min Yi. "Simple and Ingenious Mobile Botnet Covert Network Based on Adjustable Unit (SIMBAIDU)". Mathematical Problems in Engineering 2021 (3 agosto 2021): 1–6. http://dx.doi.org/10.1155/2021/9920883.
Testo completoYerima, Suleiman Y., Mohammed K. Alzaylaee, Annette Shajan e Vinod P. "Deep Learning Techniques for Android Botnet Detection". Electronics 10, n. 4 (23 febbraio 2021): 519. http://dx.doi.org/10.3390/electronics10040519.
Testo completoLi, Na, Yan Hui Du e Guang Xun Chen. "CPbot: The Construction of Mobile Botnet Using GCM". Applied Mechanics and Materials 635-637 (settembre 2014): 1526–29. http://dx.doi.org/10.4028/www.scientific.net/amm.635-637.1526.
Testo completoSun, Fenggang, Lidong Zhai, Yuejin Du, Peng Wang e Jun Li. "Design of Mobile Botnet Based on Open Service". International Journal of Digital Crime and Forensics 8, n. 3 (luglio 2016): 1–10. http://dx.doi.org/10.4018/ijdcf.2016070101.
Testo completoYusof, Muhammad, Madihah Mohd Saudi e Farida Ridzuan. "Mobile Botnet Classification by using Hybrid Analysis". International Journal of Engineering & Technology 7, n. 4.15 (7 ottobre 2018): 103. http://dx.doi.org/10.14419/ijet.v7i4.15.21429.
Testo completoLin, Kuan-Cheng, Sih-Yang Chen e Jason C. Hung. "Botnet Detection Using Support Vector Machines with Artificial Fish Swarm Algorithm". Journal of Applied Mathematics 2014 (2014): 1–9. http://dx.doi.org/10.1155/2014/986428.
Testo completoBernardeschi, Cinzia, Francesco Mercaldo, Vittoria Nardone e Antonella Santone. "Exploiting Model Checking for Mobile Botnet Detection". Procedia Computer Science 159 (2019): 963–72. http://dx.doi.org/10.1016/j.procs.2019.09.263.
Testo completoJiang, Ruei Min, Jia Sian Jhang, Fu Hau Hsu, Yan Ling Hwang, Pei Wen Huang e Yung Hoh Sheu. "JokerBot – An Android-Based Botnet". Applied Mechanics and Materials 284-287 (gennaio 2013): 3454–58. http://dx.doi.org/10.4028/www.scientific.net/amm.284-287.3454.
Testo completoTesi sul tema "Mobile botnet"
Vural, Ickin. "Spamming mobile botnet detection using computational intelligence". Diss., University of Pretoria, 2013. http://hdl.handle.net/2263/36775.
Testo completoDissertation (MSc)--University of Pretoria, 2013.
gm2014
Computer Science
unrestricted
Meng, Xim. "An integrated network-based mobile botnet detection system". Thesis, City, University of London, 2018. http://openaccess.city.ac.uk/19840/.
Testo completoJensen, David. "Ddos Defense Against Botnets in the Mobile Cloud". Thesis, University of North Texas, 2014. https://digital.library.unt.edu/ark:/67531/metadc500027/.
Testo completoLiu, En-Bang, e 劉恩榜. "Mobile Botnet Detection on Android". Thesis, 2011. http://ndltd.ncl.edu.tw/handle/72436850018843213186.
Testo completo國立交通大學
資訊科學與工程研究所
100
Botnets are now a serious threat to the internet . The infected computers will become a puppet (zombie computer), and controlled by attacker unconsciously . This impact not only resulted in leakage of information, system damage , but also make the computers become a springboard for a major network attacks .With the high development of smart phones , the phone is not just for calling or sending messages like before , also contains the ability of surfing the internet and basic processing data ; hence many personal data , passwords , private pictures/videos are stored in the phone. The smart phone has become a mini-PC. So in recent years , many hackers continue to develop viruses , Trojan Horses , bot virus and other malicious software on mobile phones to steal private information , send advertising messages and spam e-mails. Therefore in this paper , we provide a mobile Botnet detection system on Android. Based on the group activities model and abnormal connections metric , installing the Snort IDS to detect real time traffic and the Botnet packet filter to collect abnormal traffic in the frontend. Then upload the abnormal traffic to the detection center . After collecting traffic data from many mobile phones , the center uses similarity algorithms to determine which phone is infected with the bot virus and controlled by attacker.
Pieterse, Heloise. "Design of a hybrid command and control mobile botnet". Diss., 2014. http://hdl.handle.net/2263/41816.
Testo completoDissertation (MSc)--University of Pretoria, Pretoria 2014
Computer Science
unrestricted
Kitana, Asem. "Impact of mobile botnet on long term evolution networks: a distributed denial of service attack perspective". Thesis, 2021. http://hdl.handle.net/1828/12817.
Testo completoGraduate
Chia-Wei, Kao, e 高家緯. "An Effective Unknown Botnet Malware Detection Mechanism for Android-based Mobile Devices". Thesis, 2011. http://ndltd.ncl.edu.tw/handle/11971069157005073291.
Testo completo大葉大學
資訊管理學系碩士班
99
At present, the smart phone system is developing vigorously, in which Android occupies most of the current market share, using the open operating system to provide overall effective applications (APPs) for the users to install. However, while it provides protection, it also brings harms just like a double-edged sword. Some malware may hide in the various Android APPs. This study mainly discusses one of the Android botnets, which abuses the powerful connection function of Android. Its distributed denial of service (DDoS)attacks have the features of the large-scaled botnet, plus the high mobility of the Android mobile device, so it will cause greater harm to the targets than the conventional DDoS attacks, and it is hard to track the attack source. This malware makes the Android connection slower, so that users cannot normally use the network service. What worse, the greater threat is that it blocks the operation of servers; as a result, the uninfected Android smart phones can’t normally access the network services. Nowadays, most of the conventional DDoS detection mechanisms are in the server-end, which can only temporarily relieve the DDoS attacks to stabilize the normal service, but don’t provide effective solution to the Android botnet problems. Furthermore, the conventional detectors are not designed for mobile devices, so its design mechanism is not suitable for the mobile devices with low performance, limited powers and less storage space. Therefore, in order to design an effective detection mechanism to unknown botnet malware, this study first develops a kind of Android botnet malware based on the HTTP Flood attack, which is the most inundant DDoS attack and is hard to detect; meanwhile, it cannot be detected by the well-known anti-virus software tools. Afterward, we further develop a mechanism that cannot only effectively detect a wide variety of unknown botnet malware, but also detect the botnet malware developed in this study. The performance evaluation and analysis reveal the proposed detection mechanism indeed has high detection accuracy, and is superior to the related studies in terms of performance requirements and practical applications. Thus, we affirm the proposed detection mechanism has extremely high practical application value.
LEE, CHIA-HAO, e 李家豪. "CIDP Treatment: An Innovative Mobile Botnet Covert Channel based on Caller IDs with P8 Treatment". Thesis, 2011. http://ndltd.ncl.edu.tw/handle/17943920410701052238.
Testo completo國立中央大學
資訊工程研究所
99
Nowadays we use a variety of applications on mobile phones or personal computers, and the probability of malware embedding is growing high. If there is not any robust prevention in the future, botnet will penetrate, and then manipulate the user’s mobile phones or computers and seize the authority of control. Mobile phones brought us much convenience, but also the safety of the use on it has been received more attention. In real world, because of the difference of application scenarios, the security mechanism on a personal computer in the past, although some may be directly applied, most likely seems to be no avail in smart phones, for the purpose of use as well as on different architecture. Smart phones (broadly speaking, mobile smart devices) in modern society play an important role. With the applications on the network, smart phones bring the convenience, but also led to many related security issues. This paper presents a possible way, CIDP Treatment, to achieve the control of a mobile botnet by using caller ID numbers as an innovative covert channel. We design an innovative lossless data compression treatment -- Perfect Octave Coding (P8 Coding) for this new covert channel to enhance the efficiency of the data transmission.
Capitoli di libri sul tema "Mobile botnet"
Karim, Ahmad, Syed Adeel Ali Shah e Rosli Salleh. "Mobile Botnet Attacks: A Thematic Taxonomy". In Advances in Intelligent Systems and Computing, 153–64. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-05948-8_15.
Testo completoVural, Ickin, e Hein Venter. "Mobile Botnet Detection Using Network Forensics". In Future Internet - FIS 2010, 57–67. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15877-3_7.
Testo completoBhatia, J. S., R. K. Sehgal e Sanjeev Kumar. "Honeynet Based Botnet Detection Using Command Signatures". In Advances in Wireless, Mobile Networks and Applications, 69–78. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21153-9_7.
Testo completoPorras, Phillip, Hassen Saïdi e Vinod Yegneswaran. "An Analysis of the iKee.B iPhone Botnet". In Security and Privacy in Mobile Information and Communication Systems, 141–52. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-17502-2_12.
Testo completoŠimon, Marek, Ladislav Huraj e Marián Hosťovecký. "A Mobile Botnet Model Based on P2P Grid". In Communications in Computer and Information Science, 604–15. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-65551-2_44.
Testo completoHua, Jingyu, e Kouichi Sakurai. "A SMS-Based Mobile Botnet Using Flooding Algorithm". In Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication, 264–79. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21040-2_19.
Testo completoDong, Yulong, Jun Dai e Xiaoyan Sun. "A Mobile Botnet That Meets Up at Twitter". In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 3–21. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-01704-0_1.
Testo completoLi, Na, Yanhui Du e Guangxuan Chen. "Mobile Botnet Propagation Modeling in Wi-Fi Networks". In Proceedings of the 4th International Conference on Computer Engineering and Networks, 1147–54. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-11104-9_132.
Testo completoWang, Peng, Chengwei Zhang, Xuanya Li e Can Zhang. "A Mobile Botnet Model Based on Android System". In Trustworthy Computing and Services, 54–61. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-43908-1_7.
Testo completoLi, Yue, Lidong Zhai, Zhilei Wang e Yunlong Ren. "Control Method of Twitter- and SMS-Based Mobile Botnet". In Trustworthy Computing and Services, 644–50. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-35795-4_81.
Testo completoAtti di convegni sul tema "Mobile botnet"
Choi, Byungha, Sung-Kyo Choi e Kyungsan Cho. "Detection of Mobile Botnet Using VPN". In 2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS). IEEE, 2013. http://dx.doi.org/10.1109/imis.2013.32.
Testo completoAlzahrani, Abdullah J., e Ali A. Ghorbani. "SMS-Based Mobile Botnet Detection Module". In 2016 6th International Conference on IT Convergence and Security (ICITCS). IEEE, 2016. http://dx.doi.org/10.1109/icitcs.2016.7740371.
Testo completoAbdullah, Zubaile, Madihah Mohd Saudi e Nor Badrul Anuar. "Mobile botnet detection: Proof of concept". In 2014 IEEE 5th Control and System Graduate Research Colloquium (ICSGRC). IEEE, 2014. http://dx.doi.org/10.1109/icsgrc.2014.6908733.
Testo completoAnwar, Shahid, Jasni Mohamad Zain, Zakira Inayat, Riaz Ul Haq, Ahmad Karim e Aws Naser Jabir. "A static approach towards mobile botnet detection". In 2016 3rd International Conference on Electronic Design (ICED). IEEE, 2016. http://dx.doi.org/10.1109/iced.2016.7804708.
Testo completoGuining Geng, Guoai Xu, Miao Zhang, Yixian Yang e Guang Yang. "An improved SMS based heterogeneous mobile botnet model". In 2011 International Conference on Information and Automation (ICIA). IEEE, 2011. http://dx.doi.org/10.1109/icinfa.2011.5948987.
Testo completoLiu, Tao, e Kai Zhu. "The Research of Control Mechanism in Mobile Botnet". In 2015 3rd International Conference on Machinery, Materials and Information Technology Applications. Paris, France: Atlantis Press, 2015. http://dx.doi.org/10.2991/icmmita-15.2015.279.
Testo completoLiao, Ming-Yi, Jynu-Hao Li, Chu-Sing Yang, Min Chen, Chun-Wei Tsai e Ming-Cho Chang. "Botnet Topology Reconstruction: A Case Study". In 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS). IEEE, 2012. http://dx.doi.org/10.1109/imis.2012.114.
Testo completoCai, Tao, e Futai Zou. "Detecting HTTP Botnet with Clustering Network Traffic". In 2012 8th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM). IEEE, 2012. http://dx.doi.org/10.1109/wicom.2012.6478491.
Testo completoAlzahrani, Abdullah J., e Ali A. Ghorbani. "SMS mobile botnet detection using a multi-agent system". In the 1st International Workshop. New York, New York, USA: ACM Press, 2014. http://dx.doi.org/10.1145/2602945.2602950.
Testo completoZhang, YeFei, Yi Chuan, Wang LeiWang, XinHong Hei e Guo Xie. "Fairness-power consumption re-topology strategies for mobile botnet". In 2017 International Conference on Electromagnetics in Advanced Applications (ICEAA). IEEE, 2017. http://dx.doi.org/10.1109/iceaa.2017.8065370.
Testo completo