Botnets: From IRC to Android
Proceeding: The Fourth International Conference on Digital Information Processing and Communications (ICDIPC)Publication Date: 2014-03-18
Authors : Desmond Lobo; Sarunya Lertputtarak;
Page : 23-27
Keywords : Computer Security; Malicious Software; Botnets; Android Smartphones; Battery Life;
Abstract
This paper outlines the evolution of botnets from IRC to Android. It begins by detailing the two malware that started the botnet ball rolling: the Pretty Park worm and the SubSeven Trojan horse. Having been detected for the first time in 1999, they would listen to and accept malicious commands from an Internet Relay Chat (IRC) channel. There are literally thousands of botnets operating in the world today and FortiGuard Labs is an organization that monitors the activity of these botnets on a global basis, twenty-four hours per day, seven days per week. According to FortiGuard, Vundo, Lethic, Torpig, ZeroAccess and Dorkbot have been five of the most active botnets in the last few years. This paper provides an analysis of incidents involving these five botnets and investigates the potential impact of botnets on Android-based smartphones. To avoid becoming a victim of these botnet attacks, it is recommended that you use an antivirus application that automatically activates whenever the battery is being charged.
Other Latest Articles
- A Comparison of Architectural Constraints for Feedforward Neural Diversity Machines
- Pressure Vessel Design Using the Dynamic Self-adaptive Harmony Search Algorithm
- Software Testing of Mobile Applications: Techniques and Challenges
- The Application of Wavelet Threshold De-noising in Mobile Oxygen Saturation Monitoring Software
- BUNDLE PROTOCOL ALONG WITH OLSR IN MANET?
Last modified: 2014-03-24 23:06:32