Proceedings of the ACM SIGCOMM 2012 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communi 2012
DOI: 10.1145/2342356.2342422
|View full text |Cite
|
Sign up to set email alerts
|

First insights from a mobile honeypot

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2013
2013
2018
2018

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 2 publications
0
5
0
Order By: Relevance
“…Similarly, most of the honeypots are designed for one fixed use case and lag the option to be configured to emulate different devices easily. Only a few honeypots have been designed to be mobile or portable [14], [17], [18], offering the ability to be placed close to the operating area of UAVs or perhaps even mounted to a UAV directly. Finally, it is vital for a honeypot to emulate a drone's radio interfaces; none of the honeypots is designed to emulate and log WiFi radios, only Bluepot [13] can emulate the (rarely used) Bluetooth radio.…”
Section: Obex Table I Analysis Of Honeypot Drone Capabilities In the State Of The Artmentioning
confidence: 99%
“…Similarly, most of the honeypots are designed for one fixed use case and lag the option to be configured to emulate different devices easily. Only a few honeypots have been designed to be mobile or portable [14], [17], [18], offering the ability to be placed close to the operating area of UAVs or perhaps even mounted to a UAV directly. Finally, it is vital for a honeypot to emulate a drone's radio interfaces; none of the honeypots is designed to emulate and log WiFi radios, only Bluepot [13] can emulate the (rarely used) Bluetooth radio.…”
Section: Obex Table I Analysis Of Honeypot Drone Capabilities In the State Of The Artmentioning
confidence: 99%
“…Existing work in this direction [8,15,7,14] focuses on the detection of mobile-specific malware. Specifically, Mulliner et al were the first to discuss the idea of a honeypot for smartphones, by providing initial ideas, challenges and an architecture for their proposed system [8].…”
Section: Related Workmentioning
confidence: 99%
“…Specifically, Mulliner et al were the first to discuss the idea of a honeypot for smartphones, by providing initial ideas, challenges and an architecture for their proposed system [8]. Moreover, in [15,14] Wahlisch et al provided insights from the deployment of a honeypot on a mobile network. However, their honeypot is not specifically crafted for mobile devices, but rather existing Linux-based desktop honeypots deployed in mobile networks.…”
Section: Related Workmentioning
confidence: 99%
“…A number of state-of-the-art honeypots can monitor and emulate Wi-Fi connectivity, as well as some relevant protocols, such as Telnet, SSH, FTP [1]. However, only few honeypots have been designed to be mobile or portable [4]- [6], offering the ability to be placed close to the operating area of UAVs or mounted to a UAV directly. More significantly, to the best of our knowledge, no existing honeypot has been specifically designed to emulate radio and protocol properties of UAVs.…”
Section: Introductionmentioning
confidence: 99%