• DocumentCode
    2043740
  • Title

    Abusing mobile devices for Denial of Service attacks

  • Author

    Vokorokos, Liberios ; Drienik, Pavol ; Fortotira, Olympia ; Hurtuk, Jan

  • Author_Institution
    Dept. of Comput. & Inf., Tech. Univ. of Kosice, Kosice, Slovakia
  • fYear
    2015
  • fDate
    22-24 Jan. 2015
  • Firstpage
    21
  • Lastpage
    24
  • Abstract
    The growing popularity of mobile devices have led to the rise of mobile malware. It is also one of the reasons why amount of new mobile malware families, which are secretly connected over the internet to a remote Command & Control server, is increasing. It gives attackers possibility to create botnets for Denial of Service attacks or mining of cryptocurrencies. This paper discusses state of the art in computer and mobile security. Paper also presents proof of concept which can be used to abuse mobile devices´ capabilities for malicious purposes. Distributed Denial of Service attack scenario is presented using smartphones with Android operating system against wireless network. Measured results and techniques are presented such as description of Android application specially created for this purposes.
  • Keywords
    Android (operating system); computer crime; computer network security; invasive software; mobile computing; smart phones; Android application; Android operating system; Internet; botnets; computer security; cryptocurrencies mining; distributed denial of service attack; malicious purposes; mobile devices capabilities; mobile malware; mobile security; remote command & control server; smartphones; wireless network; Androids; Computer crime; Humanoid robots; Mobile communication; Servers; Smart phones;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Applied Machine Intelligence and Informatics (SAMI), 2015 IEEE 13th International Symposium on
  • Conference_Location
    Herl´any
  • Type

    conf

  • DOI
    10.1109/SAMI.2015.7061886
  • Filename
    7061886