802.11 network intrusion detection using genetic programming
GECCO '05 Proceedings of the 7th annual workshop on Genetic and evolutionary computation
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Active behavioral fingerprinting of wireless devices
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Bluetooth Network-Based Misuse Detection
ACSAC '08 Proceedings of the 2008 Annual Computer Security Applications Conference
International Journal of Mobile Communications
Wireless honeypots: survey and assessment
Proceedings of the 2009 conference on Information Science, Technology and Applications
Design of anti-GPS for reasons of security
CIS'09 Proceedings of the international conference on Computational and information science 2009
Hi-index | 0.00 |
This paper presents honeyM, a framework for deploying virtual mobile device honeyclients. Honeyclients provide the ability discover early warnings about novel attacks and ex- ploitations and are typically deployed to protect wired infrastructure. In a wireless environment, honeyclients usually record attacks against the wireless access point. To identify attacks targeted specifically against mobile device users on wireless networks, we present honeyM. honeyM is a frame- work for virtual mobile honeyclients and contains a library of simulated mobile devices. honeyM emulates the wireless, Bluetooth, and GPS stacks of an actual mobile device in order to deceive mobile device fingerprinting tools. This paper discusses the design and framework for honeyM and demonstrates the necessity to provide a system to protect mobile users. In this paper, we implemented and evaluated the use of virtual honeyclients for mobile devices in two high risk environments, including a wireless security course and the