Poster: HoneyDroid - Creating a Smartphone Honeypot

نویسندگان

  • Collin Mulliner
  • Steffen Liebergeld
چکیده

Attacks against smartphones are becoming commonplace today, especially since they are connected to the Internet at all times. Current attacks range from worms and botnets [9], to user installed Trojans [8]. New vulnerabilities in smartphones emerge fast particularly since today’s smartphones are based on common software libraries such as the Linux kernel or the WebKit browser engine. In order to keep up with new attack trends we believe that it makes sense to adopt the honeypot scheme for smartphones. Honeypot: a computer system, built and deployed just for the goal of being attacked and compromised in order to study new attacks and to serve as an early warning system. In the past honeypots and honeynets (a network of honeypots) [10], [1], [5] have shown to efficiently detect scanning worms and attacks that exploit vulnerabilities.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

SmartPot - Creating a 1 Generation Smartphone Honeypot

This paper discusses an experimental method for creating a 1 generation smart-phone honey-pot with the intention of discovering automated worms. A Honeyd low-interaction virtual honey-pot is conceived as a possible method of discovering automated smart-phone worms by emulating the operating system Windows Mobile 5 and Windows Mobile 6, along with the available TCP/UDP ports of each operating sy...

متن کامل

Nomadic Honeypots: A Novel Concept for Smartphone Honeypots

Intelligence on mobile threats is a valuable asset. Honeypots showed to provide a good resource to gain threat intelligence in other areas. Unfortunately, current malware largely relies on social engineering to infect smartphones. Recently, attacks against smartphones have shifted towards local communication interfaces. These trends make traditional honeypot concepts unsuitable. We propose a no...

متن کامل

Towards Measuring the Effectiveness of Telephony Blacklists

The convergence of telephony with the Internet has led to numerous new attacks that make use of phone calls to defraud victims. In response to the increasing number of unwanted or fraudulent phone calls, a number of call blocking applications have appeared on smartphone app stores, including a recent update to the default Android phone app that alerts users of suspected spam calls. However, lit...

متن کامل

Building a Honeypot to Research Cyber-Attack Techniques Interim report

The internet can be a dark and dangerous place; featuring viruses and cyber attacks. This project aims to uncover some of these threats and reveal just how vulnerable the internet can be. The project involves creating a honeypot a device designed to attract cyber attackers and to analyse cyber attacks to see what’s going on in the dark underworld of the internet. This interim report introduces ...

متن کامل

POSTER: Passwords on Flexible Display Devices

Flexible display devices allow users to interact with the device by deforming the surface of the display to trigger a command. When these devices become mainstream, for example as smart phones, e-readers, or tablets, they will require a means of authenticating legitimate users. In this poster, we present an authentication scheme for flexible display devices, its implementation on a flexible dis...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011