
Then, we review the technical aspects and discuss the state of the art in each category.

According to the participation of infrastructure, we classify the existing strategies into two major categories, namely infrastructure-based strategies and infrastructure-less strategies. This article aims to present a comprehensive overview of mobile data offloading. As a promising way to tackle this problem, mobile data offloading is considered to transfer traffic which originally generates towards cellular network to complementary networks. Therefore, it is an urgent agenda for cellular network operators to find out immediate solutions. As a result, cellular networks can not offer sufficient capacity to accommodate the numerous mobile data requirements. This has already caused data overload on cellular networks. With the explosive increase of smartphones, tablets and laptops, the past few years have witnessed the exponential rise of mobile data traffic. The data were also assigned labels with more than 94% accuracy.
#Wireshark mac bluetooth interface android
Simulation results also indicated that more than 14 million packets of Android botnets traffic were collected to create 28-SABD. Finally, the remainder of the captured data (test dataset) was labeled using an ensemble Semi-Supervised KNN algorithm and the training dataset. As a result, the training dataset with reliable labels and the test dataset without labels were created. Then, the ensemble K-Nearest Neighbors (KNN) technique was used in order to improve the accuracy of the assigned labels by the signature-based method. A small percentage of the captured data was labeled by a signature-based method. Hence, 14 families of Android botnets including 1929 Android applications were exploited and their traffic was captured in execution and background manner. Therefore, present study attempted to create a 28 Standard Android Botnet Dataset (28-SABD). However, there is no standard dataset which contain most of Android botnets families.

In addition, it is an open source OS that allows attackers to exploit the bugs of the OS. The Android Operating system (OS) has the largest number of users among other OS smartphones. Hyper Text Transfer Protocol, SMS, and Bluetooth are three protocols which are used by the mobile botnets to communicate.
#Wireshark mac bluetooth interface software
A mobile botnet is a malicious software which as an advanced version of botnet can do destructive functions such as stealing important information, Denial of Service attack, sending malicious codes through Short Message Service (SMS), eavesdropping and recently extracting electronic crypto currency mining.
