Malicious attacks in Mobile Device Clouds: A data driven risk assessment

Abderrahmen Mtibaa, Khaled A. Harras, Hussein Alnuweiri

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Citations (Scopus)

Abstract

Mobile Device Clouds are becoming a reality with the quantitative and qualitative upgrades on mobile devices such as smart-phones and tablets. This proliferation renders mobile devices capable of initiating sophisticated cyberattacks especially when they coordinate together and form a distributed mobile botnets which we call 'MobiBots'. MobiBots infect a large number of mobile devices and schedule targeted attacks by leveraging device-to-device (d2d) short range wireless communications. In this work, we first introduce MobiBots, the formation of MobiBots, their challenges, and limitations. We then make the case for MobiBots utilization. We show the potential for and impact of the large scale infection and coordination of mobile devices via short range wireless technologies in attacks against other mobile devices that come within proximity. We show that MobiBots are difficult to detect and isolate compared to common botnets. However, prevention techniques cost at least 40% of the network capacity.

Original languageEnglish
Title of host publication2014 23rd International Conference on Computer Communication and Networks, ICCCN Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781479935727
DOIs
Publication statusPublished - 25 Sep 2014
Event2014 23rd International Conference on Computer Communication and Networks, ICCCN 2014 - Shanghai, China
Duration: 4 Aug 20147 Aug 2014

Publication series

NameProceedings - International Conference on Computer Communications and Networks, ICCCN
ISSN (Print)1095-2055

Other

Other2014 23rd International Conference on Computer Communication and Networks, ICCCN 2014
CountryChina
CityShanghai
Period4/8/147/8/14

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Hardware and Architecture
  • Software

Fingerprint Dive into the research topics of 'Malicious attacks in Mobile Device Clouds: A data driven risk assessment'. Together they form a unique fingerprint.

  • Cite this

    Mtibaa, A., Harras, K. A., & Alnuweiri, H. (2014). Malicious attacks in Mobile Device Clouds: A data driven risk assessment. In 2014 23rd International Conference on Computer Communication and Networks, ICCCN Proceedings [6911812] (Proceedings - International Conference on Computer Communications and Networks, ICCCN). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ICCCN.2014.6911812