From botnets to MobiBots

A novel malicious communication paradigm for mobile botnets

Abderrahmen Mtibaa, Khaled A. Harras, Hussein Alnuweiri

Research output: Contribution to journalArticle

4 Citations (Scopus)

Abstract

Cyber security is moving from traditional infrastructure to sophisticated mobile infrastructureless threats. A major concern is that such imminent transition is happening at a rate far exceeding the evolution of security solutions. In fact, the transformation of mobile devices into highly capable computing platforms makes the possibility of security attacks originating from within the mobile network a reality. Today, mobile devices are capable of initiating sophisticated cyberattacks, especially when they coordinate together to form what we call a MobiBot. MobiBots differ from classical botnets in that they exploit mobile operating system vulnerabilities and the advantages of device-to-device communication to mask malicious code propagation.

Original languageEnglish
Article number7180509
Pages (from-to)61-67
Number of pages7
JournalIEEE Communications Magazine
Volume53
Issue number8
DOIs
Publication statusPublished - 1 Aug 2015
Externally publishedYes

Fingerprint

Mobile devices
Computer operating systems
Communication
Masks
Wireless networks
Botnet

ASJC Scopus subject areas

  • Computer Science Applications
  • Computer Networks and Communications
  • Electrical and Electronic Engineering

Cite this

From botnets to MobiBots : A novel malicious communication paradigm for mobile botnets. / Mtibaa, Abderrahmen; Harras, Khaled A.; Alnuweiri, Hussein.

In: IEEE Communications Magazine, Vol. 53, No. 8, 7180509, 01.08.2015, p. 61-67.

Research output: Contribution to journalArticle

@article{ecddb4540f37446fb9a979bee69dab93,
title = "From botnets to MobiBots: A novel malicious communication paradigm for mobile botnets",
abstract = "Cyber security is moving from traditional infrastructure to sophisticated mobile infrastructureless threats. A major concern is that such imminent transition is happening at a rate far exceeding the evolution of security solutions. In fact, the transformation of mobile devices into highly capable computing platforms makes the possibility of security attacks originating from within the mobile network a reality. Today, mobile devices are capable of initiating sophisticated cyberattacks, especially when they coordinate together to form what we call a MobiBot. MobiBots differ from classical botnets in that they exploit mobile operating system vulnerabilities and the advantages of device-to-device communication to mask malicious code propagation.",
author = "Abderrahmen Mtibaa and Harras, {Khaled A.} and Hussein Alnuweiri",
year = "2015",
month = "8",
day = "1",
doi = "10.1109/MCOM.2015.7180509",
language = "English",
volume = "53",
pages = "61--67",
journal = "IEEE Communications Magazine",
issn = "0163-6804",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
number = "8",

}

TY - JOUR

T1 - From botnets to MobiBots

T2 - A novel malicious communication paradigm for mobile botnets

AU - Mtibaa, Abderrahmen

AU - Harras, Khaled A.

AU - Alnuweiri, Hussein

PY - 2015/8/1

Y1 - 2015/8/1

N2 - Cyber security is moving from traditional infrastructure to sophisticated mobile infrastructureless threats. A major concern is that such imminent transition is happening at a rate far exceeding the evolution of security solutions. In fact, the transformation of mobile devices into highly capable computing platforms makes the possibility of security attacks originating from within the mobile network a reality. Today, mobile devices are capable of initiating sophisticated cyberattacks, especially when they coordinate together to form what we call a MobiBot. MobiBots differ from classical botnets in that they exploit mobile operating system vulnerabilities and the advantages of device-to-device communication to mask malicious code propagation.

AB - Cyber security is moving from traditional infrastructure to sophisticated mobile infrastructureless threats. A major concern is that such imminent transition is happening at a rate far exceeding the evolution of security solutions. In fact, the transformation of mobile devices into highly capable computing platforms makes the possibility of security attacks originating from within the mobile network a reality. Today, mobile devices are capable of initiating sophisticated cyberattacks, especially when they coordinate together to form what we call a MobiBot. MobiBots differ from classical botnets in that they exploit mobile operating system vulnerabilities and the advantages of device-to-device communication to mask malicious code propagation.

UR - http://www.scopus.com/inward/record.url?scp=84939250765&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84939250765&partnerID=8YFLogxK

U2 - 10.1109/MCOM.2015.7180509

DO - 10.1109/MCOM.2015.7180509

M3 - Article

VL - 53

SP - 61

EP - 67

JO - IEEE Communications Magazine

JF - IEEE Communications Magazine

SN - 0163-6804

IS - 8

M1 - 7180509

ER -