Honeypotlabsac: a Virtual Honeypot Framework for Android
نویسندگان
چکیده
Mobile devices suffer daily threats of various kinds, in particular in a digital form, where users without consent receives and installs malware on their mobile devices via wireless networks, getting their information vulnerable to unauthorized persons. Aiming to learn more targeted attacks on mobile devices, this paper presents a mechanism that emulates services and protocols within a mobile device with the Android OS. Our work is inspired by the idea of a Honeypot and its use is to learn from the invader. Thus, we first propose a Framework for mobile devises for reuse purposes. Then, we use the Framework itself to propose a honeypot that emulates services such as telnet, http and SMS in the application level of the Android operating system
منابع مشابه
A Virtual Honeypot Framework
A honeypot is a closely monitored network decoy serving several purposes: it can distract adversaries from more valuable machines on a network, can provide early warning about new attack and exploitation trends, or allow in-depth examination of adversaries during and after exploitation of a honeypot. Deploying a physical honeypot is often time intensive and expensive as different operating syst...
متن کاملDroidCheck: Android Malware Detection by Behavioral Techniques and Honeypot
Android, the name is quite enough to show its dominance in the mobile computing world. Android is now the market leader among all its competitors. As, it is the largest shareholder in the market it has become bull’s eye for the attackers. Security is one of the major concerns for android users today. It has become the most viable target of security threats. With the increase in power and featur...
متن کاملARTDroid: A Virtual-Method Hooking Framework on Android ART Runtime
Various static and dynamic analysis techniques are developed to detect and analyze Android malware. Some advanced Android malware can use Java reflection and JNI mechanisms to conceal their malicious behaviors for static analysis. Furthermore, for dynamic analysis, emulator detection and integrity selfchecking are used by Android malware to bypass all recent Android sandboxes. In this paper, we...
متن کاملNomadic Honeypots: A Novel Concept for Smartphone Honeypots
Intelligence on mobile threats is a valuable asset. Honeypots showed to provide a good resource to gain threat intelligence in other areas. Unfortunately, current malware largely relies on social engineering to infect smartphones. Recently, attacks against smartphones have shifted towards local communication interfaces. These trends make traditional honeypot concepts unsuitable. We propose a no...
متن کاملHoneyd: A Virtual Honeypot Daemon
Honeypots are closely monitored network decoys serving several purposes: they can distract adversaries from more valuable machines on a network, they can provide early warning about new attack and exploitation trends and they allow in-depth examination of adversaries during and after exploitation of a honeypot. Deploying physical honeypots is often time intensive and expensive as different oper...
متن کامل