Version 1
: Received: 16 May 2017 / Approved: 16 May 2017 / Online: 16 May 2017 (13:23:18 CEST)
How to cite:
Aydinli, D.; Koroglu, E.; Erol, V. Abuse of Mobile Devices by Making Reverse Proxy Server. Preprints2017, 2017050123. https://doi.org/10.20944/preprints201705.0123.v1
Aydinli, D.; Koroglu, E.; Erol, V. Abuse of Mobile Devices by Making Reverse Proxy Server. Preprints 2017, 2017050123. https://doi.org/10.20944/preprints201705.0123.v1
Aydinli, D.; Koroglu, E.; Erol, V. Abuse of Mobile Devices by Making Reverse Proxy Server. Preprints2017, 2017050123. https://doi.org/10.20944/preprints201705.0123.v1
APA Style
Aydinli, D., Koroglu, E., & Erol, V. (2017). Abuse of Mobile Devices by Making Reverse Proxy Server. Preprints. https://doi.org/10.20944/preprints201705.0123.v1
Chicago/Turabian Style
Aydinli, D., Emre Koroglu and Volkan Erol. 2017 "Abuse of Mobile Devices by Making Reverse Proxy Server" Preprints. https://doi.org/10.20944/preprints201705.0123.v1
Abstract
Mobile devices have become tools we spend our free time where we carry them with us every moment, they allow us to interact with the environment, we immortalize the moment when necessary. These devices which we spend most of our daily life become very common in recent years and even there are unique business areas emerged. It was announced that the number of people using smartphones is over than 2.5 billion in the first quarter of 2016. As people become more addicted to mobile technology, they become the target of malevolent people. A huge increase in the number of mobile malware is observed as the number of the users increase. Billions of users at risk day by day due to the development of the methods. We have addressed the recent methods used and the types of malware that target mobile devices in our study. We have mentioned the proxy server and reverse proxy server operation logic. We discuss the method of turning mobile devices into reverse proxy servers, risks involved and protection methods.
Keywords
Mobile device threats; mobile device malware; reverse proxy server; cyber security; android security; ios security; abuse of local area network; DNS spoofing; DNS hijacking
Subject
Computer Science and Mathematics, Computer Science
Copyright:
This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.