“Design and Detection of Mobile Botnet Attacks”
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 6
Abstract
Abstract: A mobile botnet is a type of bot that runs automatically when installed on a mobile phone, which does not have any anti-malware. The botnet gains complete access over our mobile device. The common propagation medium for smartphone based botnet attacks are SMS, Bluetooth and Wi-Fi. In our project, we willdemonstrate a SMS-cum-Wi-Fi based mobile botnet using a centralized C&C server. The botmaster initiates commands to C&C server and the C&C propagates to infected smartphones i.e. bots. We will try to develop a network which cannot be detected easily and propagates fast. The target of the propagation will be AndroidOperating System. For detection, an application is created to detect whether smartphone is working as bot or not. In this, we guide user about possible botnet attacks
Authors and Affiliations
Aishwarya A. Bhandari , Jyoti D. Bhalchim , Suman P. Bansode , Anuja Lambate , Prof. Sonali Tidke
Intent Search and Centralized Sybil Defence Mechanism for Social Network
Abstract: Sybil attacks are the major problems occurred in the distributed systems without trusted identities. It occur when the one-to-one relationship between a node and its identity is violated. This is occurred by an...
An Automated Model to Detect Fake Profiles and botnets inOnline Social Networks Using Steganography Technique
Abstract: At the present time, hundreds of millions of active users all around the world are using online socialnetwork, such as Facebook, Twitter, Tumblr and LinkedIn. This service turned out to be one of the most...
Multicast and Unicast Communication in Vehicular Network Using IPv6.
Now a days the research is going on in Vehicular ad-hoc network to make a city as Smart city for the driver and passengers to navigate and to obtain relevant information and avoid the traffic accident. In the proposed sy...
Service Cost Estimation in Cloud Environment Using a Third Party Web Server: A Comparative Analysis With and Without Using Cloud Computing
This paper maps the idea of software maintenance cost estimation process onto cloud computing service cost. We have many models for effort estimation in maintenance. Here we implement any cost estimation model to...
Cloud Data Sharing in a Dynamic Group with a Dual Secure Technology
Abstract: Cloud data sharing is an untrustworthy service where any malicious user can access the data from cloud storage and make use of it so an encryption technique is used to convert data into a unreadable forma...