Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

Abuse of Mobile Devices by Making Reverse Proxy Server

Version 1 : Received: 16 May 2017 / Approved: 16 May 2017 / Online: 16 May 2017 (13:23:18 CEST)

How to cite: Aydinli, D.; Koroglu, E.; Erol, V. Abuse of Mobile Devices by Making Reverse Proxy Server. Preprints 2017, 2017050123. https://doi.org/10.20944/preprints201705.0123.v1 Aydinli, D.; Koroglu, E.; Erol, V. Abuse of Mobile Devices by Making Reverse Proxy Server. Preprints 2017, 2017050123. https://doi.org/10.20944/preprints201705.0123.v1

Abstract

Mobile devices have become tools we spend our free time where we carry them with us every moment, they allow us to interact with the environment, we immortalize the moment when necessary. These devices which we spend most of our daily life become very common in recent years and even there are unique business areas emerged. It was announced that the number of people using smartphones is over than 2.5 billion in the first quarter of 2016. As people become more addicted to mobile technology, they become the target of malevolent people. A huge increase in the number of mobile malware is observed as the number of the users increase. Billions of users at risk day by day due to the development of the methods. We have addressed the recent methods used and the types of malware that target mobile devices in our study. We have mentioned the proxy server and reverse proxy server operation logic. We discuss the method of turning mobile devices into reverse proxy servers, risks involved and protection methods.

Keywords

Mobile device threats; mobile device malware; reverse proxy server; cyber security; android security; ios security; abuse of local area network; DNS spoofing; DNS hijacking

Subject

Computer Science and Mathematics, Computer Science

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.