SkyNET: a 3G-enabled mobile attack drone and stealth botmaster
WOOT'11 Proceedings of the 5th USENIX conference on Offensive technologies
Improving network security and design using honeypots
Proceedings of the CUBE International Information Technology Conference
Hi-index | 0.00 |
Malware and Botnets in particular have risen to be premier threats to computing assets. As computer criminals continue to improve their attack methods it is essential that the security community have tools at their disposal to quickly identify and remediate these ever increasing attacks. Honeypots are increasingly becoming a tool of the trade as security administrators enhance their security and follow a security in depth model for combating security threats. In this thesis, we use interaction honeypots to study the attack behaviors of mobile devices on a "real-world" university wireless network. This research project will address this security issue by investigating effective solutions to identify compromised machines in a university network. The experimental results will presented based on using low interaction honeypots such as Honeyd in a live testing environment. In addition, various honeypots are tested and compared and our analysis will be documented as well.