Botnet Attack: Is it a risk for Smart Phones?

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 3

Abstract

 Abstract: With immense use of internet over smartphones, it is being a matter of concern for cyber securityexperts to provide security from ever growing threat of cyber attacks. The motivation of hackers behinddeveloping malware is shifted from joy to a profit earning market. Amongst various forms of malware, mobilebased botnet is emerged as a new threat for cyber security experts. Mobile based botnet attacks are increasingday by day and smartphone users are unaware about the harm it can cause. Considering this, the paper gives anoverview of working and propagation of mobile based botnet attacks. Common propagation medium ofsmartphone based botnet are SMS, Bluetooth, NFC and WiFi. The paper proposed a hybrid P2P system forcreating botnet using WiFi.

Authors and Affiliations

Sonali Tidke , Dr. Pravin Karde

Keywords

Related Articles

 Dynamic Load Balancing For Cloud Computing Using Heuristic Data and Load on Server

 Abstract: Cloud computing is emerging trend in Information Technology community. Cloud resources are delivered to cloud users based on the requirements. Because of the services provided by cloud, it is becoming mor...

SpMV Profiling and Optimization Analysis

Abstract: Sparse matrix-vector multiplication is an important operation when it comes to sparse matrixcomputations. Very large and sparse matrices are used in many engineering and scientific operations. Hencethe matrix n...

Duplicate Detection in Hierarchical Data Using XPath

Abstract: There were many techniques for identifying duplicates in relational data, but only a few solutions focus on identifying duplicates which has complex hierarchical structure, as XML data. In this paper, we presen...

 A Study of Image Compression Methods

 Image compression is now essential for applications such as transmission and storage in data bases. In this paper we review and discuss about the image compression, need of compression, its principles, and types...

Video Segmentation Using Global Motion Estimation and Compensation

Abstract : Video has to be segmented into objects for content-based processing. A number of video object segmentation algorithms have been proposed such as semiautomatic and automatic. Semiautomatic methods adds burden t...

Download PDF file
  • EP ID EP89463
  • DOI -
  • Views 105
  • Downloads 0

How To Cite

Sonali Tidke, Dr. Pravin Karde (2015).  Botnet Attack: Is it a risk for Smart Phones?. IOSR Journals (IOSR Journal of Computer Engineering), 17(3), 69-72. https://europub.co.uk/articles/-A-89463