DOI QR코드

DOI QR Code

A High-Interaction Client Honeypot on Android Platform

안드로이드 플랫폼에서의 High-Interaction 클라이언트 허니팟 적용방안 연구

  • 정현미 (한국과학기술정보연구원) ;
  • 손승완 (한남대학교 컴퓨터공학과) ;
  • 김광석 (한남대학교 컴퓨터공학과) ;
  • 이강수 (한남대학교 컴퓨터공학과)
  • Received : 2013.10.25
  • Accepted : 2013.12.20
  • Published : 2013.12.28

Abstract

As the new variation malicious codes of android platform are drastically increasing, the preparation plan and response is needed. We proposed a high-interaction client honeypot that applied to the android platform. We designed flow for the system. Application plan and the function was analyze. Each detail module was optimized in the Android platform. The system is equipped with the advantage of the high-interaction client honeypot of PC environment. Because the management and storage server was separated it is more flexible and expanded.

안드로이드 플랫폼에서의 새로운 변종 악성코드가 기하급수적으로 증가함에 따라 보다 빠르고 능동적인 대처방안이 필요하다. 본 연구에서는 안드로이드 플랫폼에 High-Interaction 클라이언트 허니팟을 적용하였다. 시스템 적용방안을 위하여 전체 흐름을 설계하고 각 세부모듈의 기능을 분석하여 안드로이드 플랫폼에 최적화 하였다. 제안하는 시스템은 기존 PC 환경의 High-Interaction 클라이언트 허니팟의 장점을 모두 갖추고 있으며 관리 서버와 저장 서버를 분리하여 보다 유연하고 확장된 형태로 설계되었다.

Keywords

Acknowledgement

Supported by : 한남대학교

References

  1. http://www.kisa.or.kr/
  2. Lance Spitznet (2003), Honeypots : Definitions and Value of honeypots.
  3. Thorsten Holz, Niels Provos (2008), Virtual Honeypots
  4. http://www.honeyd.org/
  5. http://www.honeynet.org/
  6. J Fritz (2011), Hybrid Intrusion detection network monitoring with honeypots.
  7. Christian Seifert, Ian Welch, Peter Komisarczuk (2006), HoneyC - The Low-Interaction Client Honeypot.
  8. https://projects.honeynet.org/capture-hpc/
  9. Radek Hes ,Ramon Steenson ,Christian Seifert (2010), The Capture-HPC client architecture
  10. Christian Seifert, Ramon Steenson, Ian Welch, Peter Komisarczuk, Thorsten Holz, Bing Yuan, Michael A. Davis (2007),Know your Enemy: Malicious Web Servers.
  11. Ali Ikinci, Thorsten Holz, Felix Freiling(2008), Monkey-Spider: Detecting Malicious Websites with Low-Interaction Honeyclients
  12. Yi-Min Wang, Doug Beck, Xuxian Jiang, Roussi Roussev, Chad Verbowski, Shuo Chen, and Sam King (2006), Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities
  13. http://research.microsoft.com/HoneyMonkey/