Malicious attacks in Mobile Device Clouds: A data driven risk assessment

Abderrahmen Mtibaa, Khaled A. Harras, Hussein Alnuweiri

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Abstract

Mobile Device Clouds are becoming a reality with the quantitative and qualitative upgrades on mobile devices such as smart-phones and tablets. This proliferation renders mobile devices capable of initiating sophisticated cyberattacks especially when they coordinate together and form a distributed mobile botnets which we call 'MobiBots'. MobiBots infect a large number of mobile devices and schedule targeted attacks by leveraging device-to-device (d2d) short range wireless communications. In this work, we first introduce MobiBots, the formation of MobiBots, their challenges, and limitations. We then make the case for MobiBots utilization. We show the potential for and impact of the large scale infection and coordination of mobile devices via short range wireless technologies in attacks against other mobile devices that come within proximity. We show that MobiBots are difficult to detect and isolate compared to common botnets. However, prevention techniques cost at least 40% of the network capacity.

Original languageEnglish
Title of host publication2014 23rd International Conference on Computer Communication and Networks, ICCCN Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781479935727
DOIs
Publication statusPublished - 1 Jan 2014
Externally publishedYes
Event2014 23rd International Conference on Computer Communication and Networks, ICCCN 2014 - Shanghai, China
Duration: 4 Aug 20147 Aug 2014

Other

Other2014 23rd International Conference on Computer Communication and Networks, ICCCN 2014
CountryChina
CityShanghai
Period4/8/147/8/14

Fingerprint

Mobile devices
Risk assessment
Communication
Costs
Botnet

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Hardware and Architecture
  • Software

Cite this

Mtibaa, A., Harras, K. A., & Alnuweiri, H. (2014). Malicious attacks in Mobile Device Clouds: A data driven risk assessment. In 2014 23rd International Conference on Computer Communication and Networks, ICCCN Proceedings [6911812] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ICCCN.2014.6911812

Malicious attacks in Mobile Device Clouds : A data driven risk assessment. / Mtibaa, Abderrahmen; Harras, Khaled A.; Alnuweiri, Hussein.

2014 23rd International Conference on Computer Communication and Networks, ICCCN Proceedings. Institute of Electrical and Electronics Engineers Inc., 2014. 6911812.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Mtibaa, A, Harras, KA & Alnuweiri, H 2014, Malicious attacks in Mobile Device Clouds: A data driven risk assessment. in 2014 23rd International Conference on Computer Communication and Networks, ICCCN Proceedings., 6911812, Institute of Electrical and Electronics Engineers Inc., 2014 23rd International Conference on Computer Communication and Networks, ICCCN 2014, Shanghai, China, 4/8/14. https://doi.org/10.1109/ICCCN.2014.6911812
Mtibaa A, Harras KA, Alnuweiri H. Malicious attacks in Mobile Device Clouds: A data driven risk assessment. In 2014 23rd International Conference on Computer Communication and Networks, ICCCN Proceedings. Institute of Electrical and Electronics Engineers Inc. 2014. 6911812 https://doi.org/10.1109/ICCCN.2014.6911812
Mtibaa, Abderrahmen ; Harras, Khaled A. ; Alnuweiri, Hussein. / Malicious attacks in Mobile Device Clouds : A data driven risk assessment. 2014 23rd International Conference on Computer Communication and Networks, ICCCN Proceedings. Institute of Electrical and Electronics Engineers Inc., 2014.
@inproceedings{b4727f00e69d49d8a26cabc748cf7442,
title = "Malicious attacks in Mobile Device Clouds: A data driven risk assessment",
abstract = "Mobile Device Clouds are becoming a reality with the quantitative and qualitative upgrades on mobile devices such as smart-phones and tablets. This proliferation renders mobile devices capable of initiating sophisticated cyberattacks especially when they coordinate together and form a distributed mobile botnets which we call 'MobiBots'. MobiBots infect a large number of mobile devices and schedule targeted attacks by leveraging device-to-device (d2d) short range wireless communications. In this work, we first introduce MobiBots, the formation of MobiBots, their challenges, and limitations. We then make the case for MobiBots utilization. We show the potential for and impact of the large scale infection and coordination of mobile devices via short range wireless technologies in attacks against other mobile devices that come within proximity. We show that MobiBots are difficult to detect and isolate compared to common botnets. However, prevention techniques cost at least 40{\%} of the network capacity.",
author = "Abderrahmen Mtibaa and Harras, {Khaled A.} and Hussein Alnuweiri",
year = "2014",
month = "1",
day = "1",
doi = "10.1109/ICCCN.2014.6911812",
language = "English",
booktitle = "2014 23rd International Conference on Computer Communication and Networks, ICCCN Proceedings",
publisher = "Institute of Electrical and Electronics Engineers Inc.",

}

TY - GEN

T1 - Malicious attacks in Mobile Device Clouds

T2 - A data driven risk assessment

AU - Mtibaa, Abderrahmen

AU - Harras, Khaled A.

AU - Alnuweiri, Hussein

PY - 2014/1/1

Y1 - 2014/1/1

N2 - Mobile Device Clouds are becoming a reality with the quantitative and qualitative upgrades on mobile devices such as smart-phones and tablets. This proliferation renders mobile devices capable of initiating sophisticated cyberattacks especially when they coordinate together and form a distributed mobile botnets which we call 'MobiBots'. MobiBots infect a large number of mobile devices and schedule targeted attacks by leveraging device-to-device (d2d) short range wireless communications. In this work, we first introduce MobiBots, the formation of MobiBots, their challenges, and limitations. We then make the case for MobiBots utilization. We show the potential for and impact of the large scale infection and coordination of mobile devices via short range wireless technologies in attacks against other mobile devices that come within proximity. We show that MobiBots are difficult to detect and isolate compared to common botnets. However, prevention techniques cost at least 40% of the network capacity.

AB - Mobile Device Clouds are becoming a reality with the quantitative and qualitative upgrades on mobile devices such as smart-phones and tablets. This proliferation renders mobile devices capable of initiating sophisticated cyberattacks especially when they coordinate together and form a distributed mobile botnets which we call 'MobiBots'. MobiBots infect a large number of mobile devices and schedule targeted attacks by leveraging device-to-device (d2d) short range wireless communications. In this work, we first introduce MobiBots, the formation of MobiBots, their challenges, and limitations. We then make the case for MobiBots utilization. We show the potential for and impact of the large scale infection and coordination of mobile devices via short range wireless technologies in attacks against other mobile devices that come within proximity. We show that MobiBots are difficult to detect and isolate compared to common botnets. However, prevention techniques cost at least 40% of the network capacity.

UR - http://www.scopus.com/inward/record.url?scp=84908200506&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84908200506&partnerID=8YFLogxK

U2 - 10.1109/ICCCN.2014.6911812

DO - 10.1109/ICCCN.2014.6911812

M3 - Conference contribution

AN - SCOPUS:84908200506

BT - 2014 23rd International Conference on Computer Communication and Networks, ICCCN Proceedings

PB - Institute of Electrical and Electronics Engineers Inc.

ER -