DOI QR코드

DOI QR Code

A High-Interaction Client Honeypot on Android Platform

안드로이드 플랫폼에서의 High-Interaction 클라이언트 허니팟 적용방안 연구

  • Jung, Hyun-Mi (Korea Institute of Science and Technology Information) ;
  • Son, Seung-Wan (Dept. of Computer Engineering, Hannam University) ;
  • Kim, Kwang-Seok (Dept. of Computer Engineering, Hannam University) ;
  • Lee, Gang-Soo (Dept. of Computer Engineering, Hannam University)
  • 정현미 (한국과학기술정보연구원) ;
  • 손승완 (한남대학교 컴퓨터공학과) ;
  • 김광석 (한남대학교 컴퓨터공학과) ;
  • 이강수 (한남대학교 컴퓨터공학과)
  • Received : 2013.10.25
  • Accepted : 2013.12.20
  • Published : 2013.12.28

Abstract

As the new variation malicious codes of android platform are drastically increasing, the preparation plan and response is needed. We proposed a high-interaction client honeypot that applied to the android platform. We designed flow for the system. Application plan and the function was analyze. Each detail module was optimized in the Android platform. The system is equipped with the advantage of the high-interaction client honeypot of PC environment. Because the management and storage server was separated it is more flexible and expanded.

Keywords

android platform;mobile malicious code analysis;android malicious code;client honeypot;variation malicious code

Acknowledgement

Supported by : 한남대학교

References

  1. http://www.kisa.or.kr/
  2. Lance Spitznet (2003), Honeypots : Definitions and Value of honeypots.
  3. Thorsten Holz, Niels Provos (2008), Virtual Honeypots
  4. http://www.honeyd.org/
  5. http://www.honeynet.org/
  6. J Fritz (2011), Hybrid Intrusion detection network monitoring with honeypots.
  7. Christian Seifert, Ian Welch, Peter Komisarczuk (2006), HoneyC - The Low-Interaction Client Honeypot.
  8. https://projects.honeynet.org/capture-hpc/
  9. Radek Hes ,Ramon Steenson ,Christian Seifert (2010), The Capture-HPC client architecture
  10. Ali Ikinci, Thorsten Holz, Felix Freiling(2008), Monkey-Spider: Detecting Malicious Websites with Low-Interaction Honeyclients
  11. Yi-Min Wang, Doug Beck, Xuxian Jiang, Roussi Roussev, Chad Verbowski, Shuo Chen, and Sam King (2006), Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities
  12. http://research.microsoft.com/HoneyMonkey/
  13. Christian Seifert, Ramon Steenson, Ian Welch, Peter Komisarczuk, Thorsten Holz, Bing Yuan, Michael A. Davis (2007),Know your Enemy: Malicious Web Servers.