W. Z. A. Zakaria, Faiszatulnasro Mohd Maksom, Kilausuria Abdullah
{"title":"Observing the presence of mobile malwares using low-interaction honeypot","authors":"W. Z. A. Zakaria, Faiszatulnasro Mohd Maksom, Kilausuria Abdullah","doi":"10.1109/ISCAIE.2016.7575048","DOIUrl":null,"url":null,"abstract":"The large user base of mobile devices, such as smartphones and tablets equipped with high-speed Internet connectivity and abundance of apps, this portable yet powerful computing devices has become an interesting target for cyberattackers. Based from incident reports received by MyCERT, there is a rising trend of malware attacks on mobile platforms. The ubiquitous, fast response and lack of protection nature of these devices more or less has helped the spreading of cyberthreats on mobile devices. This paper review and investigates the utilization of low-interaction honeypots in detecting and learning about mobile malwares.","PeriodicalId":412517,"journal":{"name":"2016 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISCAIE.2016.7575048","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
The large user base of mobile devices, such as smartphones and tablets equipped with high-speed Internet connectivity and abundance of apps, this portable yet powerful computing devices has become an interesting target for cyberattackers. Based from incident reports received by MyCERT, there is a rising trend of malware attacks on mobile platforms. The ubiquitous, fast response and lack of protection nature of these devices more or less has helped the spreading of cyberthreats on mobile devices. This paper review and investigates the utilization of low-interaction honeypots in detecting and learning about mobile malwares.