This network is infected: HosTaGe - A low-interaction honeypot for mobile devices

Emmanouil Vasilomanolakis, Shankar Karuppayah, Mathias Fischer, Max Mühlhäuser, Mihai Plasoianu, Lars Pandikow, Wulf Pfeiffer

Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

13 Citations (Scopus)

Abstract

In recent years, the number of sophisticated cyber attacks has increased rapidly. At the same time, people tend to utilize unknown, in terms of trustworthiness, wireless networks in their daily life. They connect to these networks, e.g., airports, without knowledge of whether they are safe or infected with actively propagating malware. In traditional networks, malicious behavior can be detected via Intrusion Detection Systems (IDSs). However, IDSs cannot be applied easily to mobile environments and to resource constrained devices. Another common defense mechanism is honeypots, i.e., systems that pretend to be an attractive target to attract malware and attackers. As a honeypot has no productive use, each attempt to access it can be interpreted as an attack. Hence, they can provide an early indication on malicious network environments. Since low interaction honeypots do not demand high CPU or memory requirements, they are suitable to resource constrained devices like smartphones or tablets. In this paper we present the idea of Honeypot-To-Go. We envision portable honeypots on mobile devices that aim on the fast detection of malicious networks and thus boost the security awareness of users. Moreover, to demonstrate the feasibility of this proposal we present our prototype HosTaGe, a low-interaction honeypot implemented for the Android OS. We present some initial results regarding the performance of this application as well as its ability to detect attacks in a realistic environment. To the best of our knowledge, HosTaGe is the first implementation of a generic low-interaction honeypot for mobile devices.

Original languageEnglish
Title of host publicationSPSM 2013 - Proceedings of the 2013 ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, Co-located with CCS 2013
Number of pages6
Publication date2013
Pages43-48
ISBN (Print)9781450324915
DOIs
Publication statusPublished - 2013
Externally publishedYes
Event3rd ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM 2013, Held in Association with the 20th ACM Conference on Computer and Communications Security, CCS 2013 - Berlin, Germany
Duration: 8 Nov 20138 Nov 2013

Conference

Conference3rd ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM 2013, Held in Association with the 20th ACM Conference on Computer and Communications Security, CCS 2013
Country/TerritoryGermany
CityBerlin
Period08/11/201308/11/2013
SeriesProceedings of the ACM Conference on Computer and Communications Security
ISSN1543-7221

Keywords

  • android
  • malware
  • mobile honeypot
  • security

Fingerprint

Dive into the research topics of 'This network is infected: HosTaGe - A low-interaction honeypot for mobile devices'. Together they form a unique fingerprint.

Cite this