Presentation Title

Investigating Criminal Intent with Mobile Botnets

Presenter Information

Joshua Pritchett

Mentor

Wei Lu

Location

David F. Putnam Science Center - 175

Abstract

Over the last few years there has been a convergence of human activities using mobile computing with devices such as tablets or smartphones. This research will investigate one of the biggest criminal security threats called a mobile botnet, responsible for criminal activities known as distributed denial of service (DDoS) attacks. DDoS attacks attempt to make a machine or network resource unavailable to its intended users. A mobile botnet refers to a collection of infected mobile devices (bots) that interact to accomplish some distributed task (DDoS attack) for illegal purposes. The bots are controlled by an attacker (botmaster) through various command and control channels implemented by mobile applications. In this research, we will first simulate a mobile botnet system called mongoose running on mobile devices. Thereafter, the communications between the botmaster and bots using the mongoose application in order to understand DDoS attacks targeted towards a centralized business or academic server.

Share

COinS
 
Apr 11th, 9:10 AM Apr 11th, 10:10 AM

Investigating Criminal Intent with Mobile Botnets

David F. Putnam Science Center - 175

Over the last few years there has been a convergence of human activities using mobile computing with devices such as tablets or smartphones. This research will investigate one of the biggest criminal security threats called a mobile botnet, responsible for criminal activities known as distributed denial of service (DDoS) attacks. DDoS attacks attempt to make a machine or network resource unavailable to its intended users. A mobile botnet refers to a collection of infected mobile devices (bots) that interact to accomplish some distributed task (DDoS attack) for illegal purposes. The bots are controlled by an attacker (botmaster) through various command and control channels implemented by mobile applications. In this research, we will first simulate a mobile botnet system called mongoose running on mobile devices. Thereafter, the communications between the botmaster and bots using the mongoose application in order to understand DDoS attacks targeted towards a centralized business or academic server.