Participatory Honeypots: A Paradigm Shift in the Fight Against Mobile Botnets
نویسندگان
چکیده
Due to the substantially different ecosystem we have to deal with when it comes to mobile security, using conventional techniques make harder to detect and react to malware attacks. We introduce the concept of Participatory Honeypot, a privacy-by-design system where users becomes partner of the collection of meaningful information subsequently used for the analysis.
منابع مشابه
Honeypot detection in advanced botnet attacks
Botnets have become one of the major attacks in current Internet due to their illicit profitable financial gain. Meanwhile, honeypots have been successfully deployed in many computer security defense systems. Since honeypots set up by security defenders can attract botnet compromises and become spies in exposing botnet membership and botnet attacker behaviors, they are widely used by security d...
متن کاملA Survey of Botnet Detection Techniques by Command and Control Infrastructure
Botnets have evolved to become one of the most serious threats to the Internet and there is substantial research on both botnets and botnet detection techniques. This survey reviewed the history of botnets and botnet detection techniques. The survey showed traditional botnet detection techniques rely on passive techniques, primarily honeypots, and that honeypots are not effective at detecting p...
متن کاملNetwork Defence on the Cheap: Honeypots as Network Security Monitors
The detection and prevention of malware attacks, particularly from sophisticated botnets, has become an increasingly time consuming task for network administrators. Firewalls and Intrusion Prevention Systems (IPSs) are useful defensive weapons, but how do we know they are effective? This paper looks at the use of honeypots located at different points on a production network so that levels of in...
متن کاملMedium Interaction Honeypots
Autonomously spreading malware has been a global threat to the Internet Community ever since the existence of the Internet as a large-scale computer network. A specialization of this threat are botnets; recent trends towards commercialization of botnets made the situation even worse. This document outlines the weaknesses of different existing approaches to catch malware – especially bots – and ...
متن کاملAvoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots
Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...
متن کامل