Honeypotlabsac: a Virtual Honeypot Framework for Android

نویسندگان

  • Vladimir B. Oliveira
  • Zair Abdelouahab
  • Denivaldo Lopes
  • Mario H. Santos
  • Valéria P. Fernandes
چکیده

Mobile devices suffer daily threats of various kinds, in particular in a digital form, where users without consent receives and installs malware on their mobile devices via wireless networks, getting their information vulnerable to unauthorized persons. Aiming to learn more targeted attacks on mobile devices, this paper presents a mechanism that emulates services and protocols within a mobile device with the Android OS. Our work is inspired by the idea of a Honeypot and its use is to learn from the invader. Thus, we first propose a Framework for mobile devises for reuse purposes. Then, we use the Framework itself to propose a honeypot that emulates services such as telnet, http and SMS in the application level of the Android operating system

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Virtual Honeypot Framework

A honeypot is a closely monitored network decoy serving several purposes: it can distract adversaries from more valuable machines on a network, can provide early warning about new attack and exploitation trends, or allow in-depth examination of adversaries during and after exploitation of a honeypot. Deploying a physical honeypot is often time intensive and expensive as different operating syst...

متن کامل

DroidCheck: Android Malware Detection by Behavioral Techniques and Honeypot

Android, the name is quite enough to show its dominance in the mobile computing world. Android is now the market leader among all its competitors. As, it is the largest shareholder in the market it has become bull’s eye for the attackers. Security is one of the major concerns for android users today. It has become the most viable target of security threats. With the increase in power and featur...

متن کامل

ARTDroid: A Virtual-Method Hooking Framework on Android ART Runtime

Various static and dynamic analysis techniques are developed to detect and analyze Android malware. Some advanced Android malware can use Java reflection and JNI mechanisms to conceal their malicious behaviors for static analysis. Furthermore, for dynamic analysis, emulator detection and integrity selfchecking are used by Android malware to bypass all recent Android sandboxes. In this paper, we...

متن کامل

Nomadic Honeypots: A Novel Concept for Smartphone Honeypots

Intelligence on mobile threats is a valuable asset. Honeypots showed to provide a good resource to gain threat intelligence in other areas. Unfortunately, current malware largely relies on social engineering to infect smartphones. Recently, attacks against smartphones have shifted towards local communication interfaces. These trends make traditional honeypot concepts unsuitable. We propose a no...

متن کامل

Honeyd: A Virtual Honeypot Daemon

Honeypots are closely monitored network decoys serving several purposes: they can distract adversaries from more valuable machines on a network, they can provide early warning about new attack and exploitation trends and they allow in-depth examination of adversaries during and after exploitation of a honeypot. Deploying physical honeypots is often time intensive and expensive as different oper...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013