Yubo Song, Xiaoyun Zhu, Yelin Hong, Haoyue Zhang, Hangbo Tan
{"title":"移动通信蜜罐观测系统","authors":"Yubo Song, Xiaoyun Zhu, Yelin Hong, Haoyue Zhang, Hangbo Tan","doi":"10.1109/MINES.2012.31","DOIUrl":null,"url":null,"abstract":"We innovatively propose a honeypot monitoring system for mobile communication to decrease the possibility of smart phones being attacked by viruses. The system applies the idea of active honeypot theory and combines with communication protection. We initially clarify the high safety protection performance of our honeypot monitoring system in the following steps: we simulates the wireless access environment and then capture the mobile phones; after that, our system can search for potential attacks, as well as analyze and monitor their communication behaviors. We discuss the feasibility and efficiency of our system by testing an Android smart phone which carries a malware that can embezzle the phone's address book. After initially triggering the malware, we use our honeypot system to show the monitoring result. Our honeypot monitoring system for mobile communication, which is mainly applied in radio link safety protection, can effectively find potential hazards and optimize protective environment. Our system will play an important role in various aspects such as commercial activities promotion and personal information protection.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"52 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"14","resultStr":"{\"title\":\"A Mobile Communication Honeypot Observing System\",\"authors\":\"Yubo Song, Xiaoyun Zhu, Yelin Hong, Haoyue Zhang, Hangbo Tan\",\"doi\":\"10.1109/MINES.2012.31\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We innovatively propose a honeypot monitoring system for mobile communication to decrease the possibility of smart phones being attacked by viruses. The system applies the idea of active honeypot theory and combines with communication protection. We initially clarify the high safety protection performance of our honeypot monitoring system in the following steps: we simulates the wireless access environment and then capture the mobile phones; after that, our system can search for potential attacks, as well as analyze and monitor their communication behaviors. We discuss the feasibility and efficiency of our system by testing an Android smart phone which carries a malware that can embezzle the phone's address book. After initially triggering the malware, we use our honeypot system to show the monitoring result. Our honeypot monitoring system for mobile communication, which is mainly applied in radio link safety protection, can effectively find potential hazards and optimize protective environment. Our system will play an important role in various aspects such as commercial activities promotion and personal information protection.\",\"PeriodicalId\":208089,\"journal\":{\"name\":\"2012 Fourth International Conference on Multimedia Information Networking and Security\",\"volume\":\"52 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-11-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"14\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 Fourth International Conference on Multimedia Information Networking and Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/MINES.2012.31\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 Fourth International Conference on Multimedia Information Networking and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MINES.2012.31","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
We innovatively propose a honeypot monitoring system for mobile communication to decrease the possibility of smart phones being attacked by viruses. The system applies the idea of active honeypot theory and combines with communication protection. We initially clarify the high safety protection performance of our honeypot monitoring system in the following steps: we simulates the wireless access environment and then capture the mobile phones; after that, our system can search for potential attacks, as well as analyze and monitor their communication behaviors. We discuss the feasibility and efficiency of our system by testing an Android smart phone which carries a malware that can embezzle the phone's address book. After initially triggering the malware, we use our honeypot system to show the monitoring result. Our honeypot monitoring system for mobile communication, which is mainly applied in radio link safety protection, can effectively find potential hazards and optimize protective environment. Our system will play an important role in various aspects such as commercial activities promotion and personal information protection.