2012 Proceedings IEEE INFOCOM 2012
DOI: 10.1109/infcom.2012.6195668
|View full text |Cite
|
Sign up to set email alerts
|

Open WiFi networks: Lethal weapons for botnets?

Abstract: Abstract-This paper assesses the potential for highly mobile botnets to communicate and perform nefarious actions using only open WiFi networks, which we term mobile WiFi botnets. We design and evaluate a proof-of-concept mobile WiFi botnet using real-world mobility traces and actual open WiFi network locations for the urban environment of San Francisco. Our extensive simulation results demonstrate that mobile WiFi botnets can support rapid command propagation, with commands typically reaching over 75% of the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2012
2012
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(3 citation statements)
references
References 6 publications
0
3
0
Order By: Relevance
“…However, the above method to detect the malware cannot predict malware spread scale and explore the key factors affecting the spread of malware. In the wireless IoT network, malware hostile activities naturally extend to physical threats and can be launched by one wireless device and spread to another device [13]. Propagation vectors such as services or functions may be used to propagate malware due to different vulnerabilities that emerge across different technologies such as IoT or IPv6 and the lack of experience in technical implementation.…”
Section: Introductionmentioning
confidence: 99%
“…However, the above method to detect the malware cannot predict malware spread scale and explore the key factors affecting the spread of malware. In the wireless IoT network, malware hostile activities naturally extend to physical threats and can be launched by one wireless device and spread to another device [13]. Propagation vectors such as services or functions may be used to propagate malware due to different vulnerabilities that emerge across different technologies such as IoT or IPv6 and the lack of experience in technical implementation.…”
Section: Introductionmentioning
confidence: 99%
“…SUbot [4] is an improved and expanded version of Andbot. Wi-Fi [5] and VoIP [6] based C&C channels are also proposed in some articles. Although those special C&C channels are stealthy, they are difficult to construct.…”
Section: Introductionmentioning
confidence: 99%
“…Thereupon, traditional defence mechanisms that block requests stemming from blacklisted IP addresses are not normally applicable to this case. Furthermore, a resourceful botmaster could configure the bots to utilize only open Wi-Fi networks in an effort to eliminate the traces of the true perpetrator behind, say, a DDoS incident [227].…”
Section: Benefits and Limitations Of Mobile Botnetmentioning
confidence: 99%