Cooperative network behavior analysis model for mobile HTTP botnet detection / Meisam Eslahi

Recently, BYOD or Bring Your Own Device has become one of the most popular methods for enterprises to provide mobility and flexibility in workplaces. The emergence of new technologies and features of mobile devices makes them integral part of every aspect of daily business activities. On the other h...

Full description

Saved in:
Bibliographic Details
Main Author: Eslahi, Meisam
Format: Book Section
Language:English
Published: Institute of Graduate Studies, UiTM 2017
Subjects:
Online Access:http://ir.uitm.edu.my/id/eprint/19881/2/ABS_MEISAM%20ESLAHI%20TDRA%20VOL%2012%20IGS%2017.pdf
http://ir.uitm.edu.my/id/eprint/19881/
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.uitm.ir.19881
record_format eprints
spelling my.uitm.ir.198812018-06-08T02:11:13Z http://ir.uitm.edu.my/id/eprint/19881/ Cooperative network behavior analysis model for mobile HTTP botnet detection / Meisam Eslahi Eslahi, Meisam Malaysia Recently, BYOD or Bring Your Own Device has become one of the most popular methods for enterprises to provide mobility and flexibility in workplaces. The emergence of new technologies and features of mobile devices makes them integral part of every aspect of daily business activities. On the other hand, mobile devices are not well protected compared to computers and their users pay less attention to security updates and solutions , therefore, these new capabilities (e.g. high internet speed and processing power) have motivated the attackers to migrate to mobile infrastructures. Thus, mobile security has become a crucial issue in BYOD or Bring Your Own Device as the employees use their own mobile devices to access an organization data and systems. The mobile attacks and threats come in different forms, such as viruses and worms. However, Mobile Botnets or MoBots are more dangerous as they pose serious threats to mobile devices and communication networks. Bot and Botnets are sophisticated form of organized cyber-crime, which infect different targets (e.g. computers or mobile devices) without attracting the users’ attention, which subsequently communicates with each other by using a Command and Control (C&C) mechanism. The main intention of Botnets is to steal the private and personal information (e.g. Zeus and Zitmo) or sensitive information of organizations (e.g. Flame and Stuxnet), thus, several techniques such as encryption and use of standard protocols (e.g. HTTP and Port 80) employed by Botmasters to develop foolproof C&C mechanism which are difficult to detect. Institute of Graduate Studies, UiTM 2017 Book Section PeerReviewed text en http://ir.uitm.edu.my/id/eprint/19881/2/ABS_MEISAM%20ESLAHI%20TDRA%20VOL%2012%20IGS%2017.pdf Eslahi, Meisam (2017) Cooperative network behavior analysis model for mobile HTTP botnet detection / Meisam Eslahi. In: The Doctoral Research Abstracts. IGS Biannual Publication, 12 (12). Institute of Graduate Studies, UiTM, Shah Alam.
institution Universiti Teknologi Mara
building Tun Abdul Razak Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Mara
content_source UiTM Institutional Repository
url_provider http://ir.uitm.edu.my/
language English
topic Malaysia
spellingShingle Malaysia
Eslahi, Meisam
Cooperative network behavior analysis model for mobile HTTP botnet detection / Meisam Eslahi
description Recently, BYOD or Bring Your Own Device has become one of the most popular methods for enterprises to provide mobility and flexibility in workplaces. The emergence of new technologies and features of mobile devices makes them integral part of every aspect of daily business activities. On the other hand, mobile devices are not well protected compared to computers and their users pay less attention to security updates and solutions , therefore, these new capabilities (e.g. high internet speed and processing power) have motivated the attackers to migrate to mobile infrastructures. Thus, mobile security has become a crucial issue in BYOD or Bring Your Own Device as the employees use their own mobile devices to access an organization data and systems. The mobile attacks and threats come in different forms, such as viruses and worms. However, Mobile Botnets or MoBots are more dangerous as they pose serious threats to mobile devices and communication networks. Bot and Botnets are sophisticated form of organized cyber-crime, which infect different targets (e.g. computers or mobile devices) without attracting the users’ attention, which subsequently communicates with each other by using a Command and Control (C&C) mechanism. The main intention of Botnets is to steal the private and personal information (e.g. Zeus and Zitmo) or sensitive information of organizations (e.g. Flame and Stuxnet), thus, several techniques such as encryption and use of standard protocols (e.g. HTTP and Port 80) employed by Botmasters to develop foolproof C&C mechanism which are difficult to detect.
format Book Section
author Eslahi, Meisam
author_facet Eslahi, Meisam
author_sort Eslahi, Meisam
title Cooperative network behavior analysis model for mobile HTTP botnet detection / Meisam Eslahi
title_short Cooperative network behavior analysis model for mobile HTTP botnet detection / Meisam Eslahi
title_full Cooperative network behavior analysis model for mobile HTTP botnet detection / Meisam Eslahi
title_fullStr Cooperative network behavior analysis model for mobile HTTP botnet detection / Meisam Eslahi
title_full_unstemmed Cooperative network behavior analysis model for mobile HTTP botnet detection / Meisam Eslahi
title_sort cooperative network behavior analysis model for mobile http botnet detection / meisam eslahi
publisher Institute of Graduate Studies, UiTM
publishDate 2017
url http://ir.uitm.edu.my/id/eprint/19881/2/ABS_MEISAM%20ESLAHI%20TDRA%20VOL%2012%20IGS%2017.pdf
http://ir.uitm.edu.my/id/eprint/19881/
_version_ 1685649271211163648
score 13.160551