Systematic Analysis on Mobile Botnet Detection Techniques Using Genetic Algorithm

Author(s):  
M. Z. A. Rahman ◽  
Madihah Mohd Saudi
Author(s):  
Muhammad Yusof ◽  
Madihah Mohd Saudi ◽  
Farida Hazwani Mohd Ridzuan

At present, mobile botnet has become a cyber threat for smartphone users especially on the Android platform. It has the capabilities to exploit the vulnerabilities and steal confidential information in the victim’s smartphone. Zeus, DroidDream and MisoSMS are examples of mobile botnets that have affected thousands of users worldwide. Therefore, this research paper presents a systematic review analysis on the existing techniques for mobile botnet detection techniques. It discusses the strengths and the weaknesses of the existing mobile botnet detection techniques and related works of mobile botnet that exploit GPS. This research paper can be used as a reference and guidance for those with the same interest.


Author(s):  
Shehu Amina ◽  
Raul Vera ◽  
Tooska Dargahi ◽  
Ali Dehghantanha

Author(s):  
Kamal Alieyan ◽  
Ammar Almomani ◽  
Rosni Abdullah ◽  
Badr Almutairi ◽  
Mohammad Alauthman

In today's internet world the internet of things (IoT) is becoming the most significant and developing technology. The primary goal behind the IoT is enabling more secure existence along with the improvement of risks at various life levels. With the arrival of IoT botnets, the perspective towards IoT products has transformed from enhanced living enabler into the internet of vulnerabilities for cybercriminals. Of all the several types of malware, botnet is considered as really a serious risk that often happens in cybercrimes and cyber-attacks. Botnet performs some predefined jobs and that too in some automated fashion. These attacks mostly occur in situations like phishing against any critical targets. Files sharing channel information are moved to DDoS attacks. IoT botnets have subjected two distinct problems, firstly, on the public internet. Most of the IoT devices are easily accessible. Secondly, in the architecture of most of the IoT units, security is usually a reconsideration. This particular chapter discusses IoT, botnet in IoT, and various botnet detection techniques available in IoT.


Author(s):  
Kamal Alieyan ◽  
Ammar Almomani ◽  
Rosni Abdullah ◽  
Badr Almutairi ◽  
Mohammad Alauthman

In today's internet world the internet of things (IoT) is becoming the most significant and developing technology. The primary goal behind the IoT is enabling more secure existence along with the improvement of risks at various life levels. With the arrival of IoT botnets, the perspective towards IoT products has transformed from enhanced living enabler into the internet of vulnerabilities for cybercriminals. Of all the several types of malware, botnet is considered as really a serious risk that often happens in cybercrimes and cyber-attacks. Botnet performs some predefined jobs and that too in some automated fashion. These attacks mostly occur in situations like phishing against any critical targets. Files sharing channel information are moved to DDoS attacks. IoT botnets have subjected two distinct problems, firstly, on the public internet. Most of the IoT devices are easily accessible. Secondly, in the architecture of most of the IoT units, security is usually a reconsideration. This particular chapter discusses IoT, botnet in IoT, and various botnet detection techniques available in IoT.


Sign in / Sign up

Export Citation Format

Share Document