DocumentCode
2043740
Title
Abusing mobile devices for Denial of Service attacks
Author
Vokorokos, Liberios ; Drienik, Pavol ; Fortotira, Olympia ; Hurtuk, Jan
Author_Institution
Dept. of Comput. & Inf., Tech. Univ. of Kosice, Kosice, Slovakia
fYear
2015
fDate
22-24 Jan. 2015
Firstpage
21
Lastpage
24
Abstract
The growing popularity of mobile devices have led to the rise of mobile malware. It is also one of the reasons why amount of new mobile malware families, which are secretly connected over the internet to a remote Command & Control server, is increasing. It gives attackers possibility to create botnets for Denial of Service attacks or mining of cryptocurrencies. This paper discusses state of the art in computer and mobile security. Paper also presents proof of concept which can be used to abuse mobile devices´ capabilities for malicious purposes. Distributed Denial of Service attack scenario is presented using smartphones with Android operating system against wireless network. Measured results and techniques are presented such as description of Android application specially created for this purposes.
Keywords
Android (operating system); computer crime; computer network security; invasive software; mobile computing; smart phones; Android application; Android operating system; Internet; botnets; computer security; cryptocurrencies mining; distributed denial of service attack; malicious purposes; mobile devices capabilities; mobile malware; mobile security; remote command & control server; smartphones; wireless network; Androids; Computer crime; Humanoid robots; Mobile communication; Servers; Smart phones;
fLanguage
English
Publisher
ieee
Conference_Titel
Applied Machine Intelligence and Informatics (SAMI), 2015 IEEE 13th International Symposium on
Conference_Location
Herl´any
Type
conf
DOI
10.1109/SAMI.2015.7061886
Filename
7061886
Link To Document