Designing a smartphone honeypot system using performance counters
نویسندگان
چکیده
منابع مشابه
Poster: HoneyDroid - Creating a Smartphone Honeypot
Attacks against smartphones are becoming commonplace today, especially since they are connected to the Internet at all times. Current attacks range from worms and botnets [9], to user installed Trojans [8]. New vulnerabilities in smartphones emerge fast particularly since today’s smartphones are based on common software libraries such as the Linux kernel or the WebKit browser engine. In order t...
متن کاملSmartPot - Creating a 1 Generation Smartphone Honeypot
This paper discusses an experimental method for creating a 1 generation smart-phone honey-pot with the intention of discovering automated worms. A Honeyd low-interaction virtual honey-pot is conceived as a possible method of discovering automated smart-phone worms by emulating the operating system Windows Mobile 5 and Windows Mobile 6, along with the available TCP/UDP ports of each operating sy...
متن کاملSecuring Wmn Using Hybrid Honeypot System
Wireless Mesh Network (WMN) has been a field of active research in the recent years. Lot of research has focused various routing mechanism but very little effort has been made towards attack detection or intrusion detection. In this paper, we propose an attack detection approach for wireless mesh network using Honeypot technique. A Honeypot is a security resource whose value lies in being probe...
متن کاملdesigning a health system performance management model for iran
Introduction The performance management is very important in order to reach the outcomes and outcomes expected from public organizations as well as to meet the public and public stakeholders in the face of the costs of public resources, and on this basis, this research deals with the formulation of performance management patterns in health and health systems method of work: this study is practi...
متن کاملToward Accurate Performance Evaluation using Hardware Counters
On-chip performance counters are gaining popularity as an analysis and validation tool. Various drivers and interfaces have been developed to access these counters. Most contemporary processors have between two and six physical counters that can monitor an equal number of unique events simultaneously at fixed sampling periods. Through multiplexing and estimation, an even greater number of uniqu...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Karbala International Journal of Modern Science
سال: 2017
ISSN: 2405-609X
DOI: 10.1016/j.kijoms.2017.02.004