First insights from a mobile honeypot

  • Authors:
  • Matthias Wählisch;Sebastian Trapp;Christian Keil;Jochen Schönfelder;Thomas C. schmidt;Jochen Schiller

  • Affiliations:
  • Freie Universität Berlin, Berlin, Germany;Freie Universität Berlin, Berlin, Germany;DFN-CERT Services GmbH, Hamburg, Germany;DFN-CERT Services GmbH, Hamburg, Germany;HAW Hamburg, Hamburg, Germany;Freie Universität Berlin, Berlin, Germany

  • Venue:
  • Proceedings of the ACM SIGCOMM 2012 conference on Applications, technologies, architectures, and protocols for computer communication
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

Computer systems are commonly attacked by malicious transport contacts. We present a comparative study that analyzes to what extent those attacks depend on the network access, in particular if an adversary targets specifically on mobile or non-mobile devices. Based on a mobile honeypot that extracts first statistical results, our findings indicate that a few topological domains of the Internet have started to place particular focus on attacking mobile networks.