Paolo Farina, E. Cambiaso, Gianluca Papaleo, M. Aiello
{"title":"了解来自移动设备的DDoS攻击","authors":"Paolo Farina, E. Cambiaso, Gianluca Papaleo, M. Aiello","doi":"10.1109/FiCloud.2015.19","DOIUrl":null,"url":null,"abstract":"The recent proliferation of smartphones and tablets leads to consider such devices as means for the execution of cyber-attacks. This scenario has rarely been considered earlier, since mobile devices always represented a target for cyber-criminals, rather than a vector to exploit. In this paper we introduce an innovative mobile bot net infrastructure, composed by mobile agents, for the execution of denial of service attacks. We prove that the chance of involving mobile bots is possible, comparing the proposed infrastructure to Low-Orbit Ion Cannon (LOIC), a well-known system in this context. Results show that in virtue of reduced resource consumption the proposed system is particularly addicted to the mobile environment. The idea of a mobile bot net is unexplored until now, therefore, the proposed system represents an important step in the mobile and cyber security field.","PeriodicalId":182204,"journal":{"name":"2015 3rd International Conference on Future Internet of Things and Cloud","volume":"25 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"25","resultStr":"{\"title\":\"Understanding DDoS Attacks from Mobile Devices\",\"authors\":\"Paolo Farina, E. Cambiaso, Gianluca Papaleo, M. Aiello\",\"doi\":\"10.1109/FiCloud.2015.19\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The recent proliferation of smartphones and tablets leads to consider such devices as means for the execution of cyber-attacks. This scenario has rarely been considered earlier, since mobile devices always represented a target for cyber-criminals, rather than a vector to exploit. In this paper we introduce an innovative mobile bot net infrastructure, composed by mobile agents, for the execution of denial of service attacks. We prove that the chance of involving mobile bots is possible, comparing the proposed infrastructure to Low-Orbit Ion Cannon (LOIC), a well-known system in this context. Results show that in virtue of reduced resource consumption the proposed system is particularly addicted to the mobile environment. The idea of a mobile bot net is unexplored until now, therefore, the proposed system represents an important step in the mobile and cyber security field.\",\"PeriodicalId\":182204,\"journal\":{\"name\":\"2015 3rd International Conference on Future Internet of Things and Cloud\",\"volume\":\"25 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-08-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"25\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 3rd International Conference on Future Internet of Things and Cloud\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/FiCloud.2015.19\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 3rd International Conference on Future Internet of Things and Cloud","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/FiCloud.2015.19","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The recent proliferation of smartphones and tablets leads to consider such devices as means for the execution of cyber-attacks. This scenario has rarely been considered earlier, since mobile devices always represented a target for cyber-criminals, rather than a vector to exploit. In this paper we introduce an innovative mobile bot net infrastructure, composed by mobile agents, for the execution of denial of service attacks. We prove that the chance of involving mobile bots is possible, comparing the proposed infrastructure to Low-Orbit Ion Cannon (LOIC), a well-known system in this context. Results show that in virtue of reduced resource consumption the proposed system is particularly addicted to the mobile environment. The idea of a mobile bot net is unexplored until now, therefore, the proposed system represents an important step in the mobile and cyber security field.