Nomadic Honeypots: A Novel Concept for Smartphone Honeypots

نویسندگان

  • Steffen Liebergeld
  • Matthias Lange
  • Collin Mulliner
چکیده

Intelligence on mobile threats is a valuable asset. Honeypots showed to provide a good resource to gain threat intelligence in other areas. Unfortunately, current malware largely relies on social engineering to infect smartphones. Recently, attacks against smartphones have shifted towards local communication interfaces. These trends make traditional honeypot concepts unsuitable. We propose a novel concept called nomadic honeypot that provides an infrastructure to enable mobile network operators to collect threat intelligence directly on smartphones. We present a practical design that confines the mobile operating system in a virtual machine. Through virtualization all communication interfaces can be monitored. The actual monitoring is carried out by a second virtual machine running on the same device. This machine hosts sensors and provides a secure backchannel for the operator. Our nomadic honeypot is meant to be used by people. Thus it has the capability to catch malware that is distributed through app stores as well as future threats that attack the smartphone using local communication such as NFC, Bluetooth, and QR codes. We implemented a prototype that runs on an off the shelf smartphone. Keywords-smartphone, honeypot, malware, worms, threat intelligence, system virtualization With rising popularity, smartphones become increasingly attractive for malware. In fact, smartphone security–or the lack thereof–has reached a level of publicity, where customers are very conscious about it. With security becoming a selling argument, being able to warn and protect customers becomes a valuable asset for cellular operators. Zhou et al. [12] found 93% of malware samples to employ C&C channels, which makes them bots. Such botnets can be very harmful to the core cellular network [11]. Therefore it is in the interest of the operators to know about such threats in order to be able to enact countermeasures. In IP networks Honeypots have been successfully used to collect threat information. However, the classical passive IPbased Honeypot does not fit the infection vectors on smartphones. Most malware today is being installed by the user himself, for example when he installs an infected App from a black market. We also observed the first infections through malicious Quick Response (QR) codes [1]. We observe that the smartphone and its user form a ”very high interaction” honeypot. The key insight is that the user is a part of the honeypot. The user involuntarily increases the honeypot’s visibility, when he installs malware, scans malicious QR codes, and interacts with malicious NFC devices and RFID tags. With this insight, we determined that the best place to collect intelligence on current mobile threats is the device itself. To this end, we introduce the concept of nomadic honeypots. Today about 37% [12] of Android malware contains root exploits to elevate its privileges. If it succeeds all security measures of the operating system (OS) become useless. Thus we cannot host our solution in the mobile OS itself. Instead we divide the device into two logical partitions. We move the entire mobile OS into its own partition and remove its direct access to the device’s communication hardware. In a second partition we host the nomadic honeypot infrastructure. It has four obligations: First it controls the communication interfaces and mediates all communication of the mobile OS. Second it hosts a wide range of sensors to collect and filter events on the communication interfaces. Third it implements facilities for snapshots and logging of the mobile OS. Fourth it establishes a secure backchannel to communicate with the operator. To show how nomadic honeypots can be constructed in practice, we present a design that is based on a modern microkernel. We implement the partitions with virtual machines (VMs). We implemented a prototype that runs on an off the shelf Samsung Galaxy S2 smartphone. Our contributions are: • Concept of nomadic honeypots We introduce nomadic honeypots as an infrastructure to collect information on threats directly on mobile devices. • Practical design We present a practical design of our nomadic honeypot. We employ virtualization to confine the mobile OS and remove its direct access to communication hardware. We mediate all communication in a separate VM, where we deploy sensors which collect information, and a secure backchannel. This paper is structured as follows. We introduce the concept of nomadic honeypots in Section I. Then we show how a nomadic honeypot can be constructed in practice in Section II. We show our prototype in Section III, and present ideas for sensors in Section IV. Sections V and VI discuss the ethical implications of nomadic honeypots and how operators can deploy them. We conclude in Section VII. I. CONCEPT OF A NOMADIC HONEYPOT The nomadic honeypot is deployed directly on a smartphone. In our concept the user plays a key role, as he is responsible for the visibility of our honeypot: He moves the honeypot into interesting areas, scans malicious QR codes and installs malicious applications. Ideally the nomadic honeypot is the primary smartphone of the user that he uses on a daily basis. We discuss an idea on how operators can make people use nomadic honeypots in Section VI. Conceptually the nomadic honeypot requires that the smartphone is logically divided into two isolated partitions. The main partition hosts the mobile OS, but has no direct access to the device’s communication hardware. Malware often includes checks if it is being run in an unusual environment such as an emulator, and turns off its malicious payload to escape detection. Therefore it is vital that the mobile OS is modified as little as possible. The second partition hosts the infrastructure for our nomadic honeypot. It has four obligations: First, it mediates all communication of the mobile OS. Second, it hosts infrastructure for data collection (sensors). Third, it implements facilities for snapshots and logging. And fourth, it provides a secure backchannel for the operator. Mediating all communication serves two purposes. First, it allows for powerful sensors that can monitor the data stream directly and no communication goes unnoticed. Second, it allows us to confine malware and stop it from spreading. Strict isolation between the partitions ensures that even a subverted mobile OS cannot tamper with the nomadic honeypot’s infrastructure. Therefore the operator can trust in the information that is being collected by the nomadic honeypot. Cryptographic keys that are needed to establish the backchannel remain confidential, and an attacker cannot use them to connect to the operator. The operator can use the collected data to gain intelligence on mobile threats. He can request snapshots of the mobile OS’s file system to do an offline forensic analysis of attacks. Thereby he can gain thorough insight on the nature of the threats and use his findings to protect his customers. An illustration of nomadic honeypots in action is given in Figure 1. II. DESIGN OF A PRACTICAL NOMADIC HONEYPOT In this section we show how a nomadic honeypot can be constructed for today’s smartphone hardware. The most prominent question is how to partition the device. ARM TrustZone [10] implements partitioning in hardware. We want to be able to deploy our nomadic honeypot to all smartphones. Therefore TrustZone is not an option because it is not implemented in all smartphones. Even if it is implemented, it is usually not available because the OEM already deployed a secure monitor that cannot be replaced. Instead we opt to do virtualization on a microkernel. As shown by Lange et al. [7] virtualization of mobile OSes like Android is possible even on Operator Malicious WiFI Inform In fo rm

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cellpot: A Concept for Next Generation Cellular Network Honeypots

Smartphones have been shown to be vulnerable. Similarly, cellular networks have been shown to be vulnerable to denial of service attacks through signaling. Attackers can use compromised smartphones to remotely attack the cellular network. Therefore the mobile network operator requires measures to detect and mitigate attacks as they emerge. In the past honeypots proved to be a valuable tool to d...

متن کامل

Comparative Study of Different Honeypots System

–A honeypot is a closely monitored network decoy serving several purposes: it can distract adversaries from more valuable machines on a network, provide early warning about new attack and exploitation trends and allow indepth examination of adversaries during and after exploitation of a honeypot. The concept of honeypots was first proposed in Clifford Stoll's book “The Cuckoo's Egg", and Bill C...

متن کامل

POSTER: Dragging Attackers to Honeypots for Effective Analysis of Cyber Threats

With the rising number of cyber threats in communication networks, there is a demand for attack analysis and the identification of new threats. Honeypots, tools for attack analysis and zero-day exploit discovery, are passive in waiting for an attacker. This paper proposes a novel approach to the effective utilization of honeypots based on cooperation between honeypots and the network in which t...

متن کامل

Modeling Malware-driven Honeypots

In this paper we propose the Hogney architecture for the deployment of malware-driven honeypots. This new concept refers to honeypots that have been dynamically configured according to the environment expected by malware. The adaptation mechanism designed here is built on services that offer up-to-date and relevant intelligence information on current threats. Thus, the Hogney architecture takes...

متن کامل

Data Collection and Data Analysis in Honeypots and Honeynets

Honeypots and honeynets are unconventional security tools to study techniques, methods, tools, and goals of attackers. Therefore, data analysis is an important part of honeypots and honeynets. In paper we focus on analysis of data collected from different honeypots and honeynets. We discuss framework to analyse honeypots’ and honeynets’ data. Also, we outline a secure way to transfer collected ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013