[Home ] [Archive]   [ فارسی ]  
:: Main :: About :: Current Issue :: Archive :: Search :: Submit :: Contact ::
Main Menu
Home::
Journal Information::
Articles archive::
For Authors::
For Reviewers::
Registration::
Site Facilities::
Indexing::
Contact us::
::
Search in website

Advanced Search
..
Receive site information
Enter your Email in the following box to receive the site news and information.
..
Print ISSN
Print ISSN: 2476-3047
..
:: Volume 4, Issue 1 (9-2015) ::
منادی 2015, 4(1): 15-37 Back to browse issues page
A review of the smart phone botnets and their confronting Techniques
Elham Abed , Reza Ebrahimi Atani *
University of Guilan
Abstract:   (4743 Views)

Withe the growth rate of smartphones, we are daily witness malwares which sits on them confidential information such as financial information and transactions, mobile banking, contact information and even steal SMS messages. One of the major damage that malware can cause the formation of mobile cellular botnets. According to statistics published in 2014, F-secure site on mobile malware threats every 5 botnet threat is one of them. The term botnet refers to a group of mobile smartphones to remotely influenced by the Director of the bot command and control channel for the control activities. In this paper, the new plans provided by mobile botnets from three points of distribution, channel botnet command and control and topology will be reviewed and ways to deal with this threat are briefly presented.

Keywords: Mobile Botnet, Malware, Defense Mechanisms, C&, amp, amp, amp, C channels.
Full-Text [PDF 3699 kb]   (1499 Downloads)    
Type of Study: Review Article | Subject: Special
Received: 2015/10/20 | Accepted: 2016/08/14 | Published: 2016/08/14
Send email to the article author

Add your comments about this article
Your username or Email:

CAPTCHA


XML   Persian Abstract   Print


Download citation:
BibTeX | RIS | EndNote | Medlars | ProCite | Reference Manager | RefWorks
Send citation to:

Abed E, Ebrahimi Atani R. A review of the smart phone botnets and their confronting Techniques. منادی 2015; 4 (1) :15-37
URL: http://monadi.isc.org.ir/article-1-32-en.html


Rights and permissions
Creative Commons License This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Volume 4, Issue 1 (9-2015) Back to browse issues page
دوفصل نامه علمی  منادی امنیت فضای تولید و تبادل اطلاعات( افتا) Biannual Journal Monadi for Cyberspace Security (AFTA)
Persian site map - English site map - Created in 0.06 seconds with 39 queries by YEKTAWEB 4645