Loading [MathJax]/extensions/TeX/extpfeil.js
Perpetrate network attacks from mobile devices | IEEE Conference Publication | IEEE Xplore

Perpetrate network attacks from mobile devices

Publisher: IEEE

Abstract:

Due to the recent evolution of mobile devices, the gap between smartphones and desktop computers has been reduced in the last year. Today, last generation smart devices c...View more

Abstract:

Due to the recent evolution of mobile devices, the gap between smartphones and desktop computers has been reduced in the last year. Today, last generation smart devices can execute almost every activity associated to a common computer. In this paper we focus on the adoption of mobile devices as a vector to perpetrate network attacks. Our aim is to prove the possibility to execute malicious activities from mobile devices. Since desktop oriented attacks are often perpetrated through anonymizing network (i.e. Tor, I2P), we also analyze a possible attack executed over an onion network. We introduce in particular a mobile denial of service threat, SlowDroid, running on Android mobile devices and making use of minimum amount of network bandwidth.
Date of Conference: 07-10 July 2015
Date Added to IEEE Xplore: 10 August 2015
Electronic ISBN:978-1-4799-8993-5

ISSN Information:

Publisher: IEEE
Conference Location: Sapporo, Japan

References

References is not available for this document.