Affiliation:
1. Advanced Cyber Security Research Centre, Department of Computing, Faculty of Science Macquarie University Sydney Australia
Abstract
SummaryThe current mobile devices have become smart and are increasingly being used for conducting business and personal activities. Also, there is increasing number of attacks targeting such mobile devices. The term mobile botnet refers to group of mobile devices that are compromised and controlled by the attacker that can be used for generating distributed denial‐of‐service attacks. The security protocols that have been proposed for wireless and mobile networks have several weaknesses that can be exploited by the attacker to obtain unauthorized access and generate attacks. Also, there is growing number of malicious applications that are aimed to compromise smartphones and using them for generating different types of attacks. In this paper, we propose techniques to counteract distributed denial‐of‐service attacks on wireless mobile devices. We describe the operation and architectural components of our model. We will show that our model is able to efficiently deal with the attacks by dropping the attack traffic before it targets the victim mobile node, can prevent the attack traffic at the upstream nodes, and also deal with the attack cases that involve mobility of the attacking and victim nodes. Copyright © 2014 John Wiley & Sons, Ltd.
Reference55 articles.
1. Mobile World Congress 2012.2012 Available from:http://techcrunch.com/2012/02/27/850k‐android‐activations‐daily‐300m‐total‐devices‐says‐andy‐rubin/[Accessed on 2 May 2014].
2. Security in Wireless Local Area Networks
3. Botnet command and control based on Short Message Service and human mobility
4. Mobile applications being used for DDoS attacks.2014 Available from:http://www.darkreading.com/mobile/mobile‐applications‐being‐used‐for‐ddos‐attacks‐according‐to‐prolexics‐latest‐quarterly‐report/d/d‐id/1141166?[Accessed on 15 April 2014].
5. Android mobile attacks spreading across the globe.2013 Available from:http://www.crn.com/news/security/240155913/android‐mobile‐attacks‐spreading‐across‐the‐globe‐mcafee‐finds.htm[Accessed on 5 June 2013].
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Radio Frequency Identification and Mobile Ad-Hoc Network;Advances in Wireless Technologies and Telecommunication;2017
2. Special issue on trust and security in wireless sensor networks;Concurrency and Computation: Practice and Experience;2015-05-20