honeyM: a framework for implementing virtual honeyclients for mobile devices

  • Authors:
  • T. J. O'Connor;Ben Sangster

  • Affiliations:
  • United States Military Academy, West Point, NY, USA;United States Military Academy, West Point, NY, USA

  • Venue:
  • Proceedings of the third ACM conference on Wireless network security
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

This paper presents honeyM, a framework for deploying virtual mobile device honeyclients. Honeyclients provide the ability discover early warnings about novel attacks and ex- ploitations and are typically deployed to protect wired infrastructure. In a wireless environment, honeyclients usually record attacks against the wireless access point. To identify attacks targeted specifically against mobile device users on wireless networks, we present honeyM. honeyM is a frame- work for virtual mobile honeyclients and contains a library of simulated mobile devices. honeyM emulates the wireless, Bluetooth, and GPS stacks of an actual mobile device in order to deceive mobile device fingerprinting tools. This paper discusses the design and framework for honeyM and demonstrates the necessity to provide a system to protect mobile users. In this paper, we implemented and evaluated the use of virtual honeyclients for mobile devices in two high risk environments, including a wireless security course and the