Javascript must be enabled to continue!
A Survey on SmartPhone Honeypot
View through CrossRef
Smartphones are becoming  a dominant form of mobile computing in the world. The Smartphone, as a platform, blends a traditional general computing platform with a specialized mobile phone platform. The general computing tradition is historically open, allowing its owners to install whatever software they choose and to add or remove hardware as they please. Also they are a vault for large amount of personal information about banking, social network, and inter-personal communication. These capabilities and information value make it an attractive target to internet miscreants.This paper presents a survey on recent researches in Smartphone honeypot. Physical and virtual honeypots have been studied in details; however, there is only little work in the field of mobile related honeypot. The survey presents the challenges while setting up a smartphone honeypot, and summarizes the researches published in this area. We clarify the methods used to build their honeypot, and the results they obtained and their recommendations.
Title: A Survey on SmartPhone Honeypot
Description:
Smartphones are becoming  a dominant form of mobile computing in the world.
The Smartphone, as a platform, blends a traditional general computing platform with a specialized mobile phone platform.
The general computing tradition is historically open, allowing its owners to install whatever software they choose and to add or remove hardware as they please.
Also they are a vault for large amount of personal information about banking, social network, and inter-personal communication.
These capabilities and information value make it an attractive target to internet miscreants.
This paper presents a survey on recent researches in Smartphone honeypot.
Physical and virtual honeypots have been studied in details; however, there is only little work in the field of mobile related honeypot.
The survey presents the challenges while setting up a smartphone honeypot, and summarizes the researches published in this area.
We clarify the methods used to build their honeypot, and the results they obtained and their recommendations.
Related Results
How can digital citizen science approaches improve ethical smartphone use surveillance among youth: traditional surveys versus ecological momentary assessments
How can digital citizen science approaches improve ethical smartphone use surveillance among youth: traditional surveys versus ecological momentary assessments
Abstract
Background
Ubiquitous use of smartphones among youth poses significant challenges related to non-communicable diseases...
The Effects of Smartphone Use During Resistance Training
The Effects of Smartphone Use During Resistance Training
Several health risks are associated with sedentary behavior; therefore, it is important to better understand behaviors such as smartphone use and how it may influence physical acti...
Penentuan Strategi Bersaing pada Dua Brand Smartphone Menggunakan Teori Permainan
Penentuan Strategi Bersaing pada Dua Brand Smartphone Menggunakan Teori Permainan
Abstract. Smartphone competition in Indonesia, especially among students, is fiercely competitive. In choosing a smartphone, a lot of considerations are made by students. Each smar...
INTENSITAS PENGGUNAAN SMARTPHONE DAN RISIKO TERJADINYA DE QUERVAIN’S SYNDROME KEPADA MAHASISWA FAKULTAS ILMU KOMPUTER DI UNIVERSITAS KLABAT
INTENSITAS PENGGUNAAN SMARTPHONE DAN RISIKO TERJADINYA DE QUERVAIN’S SYNDROME KEPADA MAHASISWA FAKULTAS ILMU KOMPUTER DI UNIVERSITAS KLABAT
The intensity of smartphone use has been considered as one of the risk factors for developing De Quervain’s Syndrome, a condition caused by repetitive hand movements leading to inf...
APAKAH PENUNDAAN WAKTU TIDUR DAPAT DISEBABKAN OLEH REGULASI DIRI DAN KECENDERUNGAN KECANDUAN SMARTPHONE? STUDI PADA PENGGUNA SMARTPHONE
APAKAH PENUNDAAN WAKTU TIDUR DAPAT DISEBABKAN OLEH REGULASI DIRI DAN KECENDERUNGAN KECANDUAN SMARTPHONE? STUDI PADA PENGGUNA SMARTPHONE
Latar Belakang: Penggunaan smartphone yang berlebihan mempunyai dampak negatif bagi penggunanya, salah satunya adalah pada penundaan waktu tidur atau bedtime procrastination. Indiv...
Localisation of Attacks, Combating Browser-Based Geo-Information and IP Tracking Attacks
Localisation of Attacks, Combating Browser-Based Geo-Information and IP Tracking Attacks
<p>Accessing and retrieving users’ browser and network information is a common practice used by advertisers and many online services to deliver targeted ads and explicit impr...
HONEYPOT: Intrusion Detection System
HONEYPOT: Intrusion Detection System
The number of computers connecting to the internet is getting increased day by day, while the number of computers connected is increasing then it is obvious that the amount of netw...
How addicted are newly admitted Undergraduate Medical Students to Smartphones?: a Cross-sectional Study from Chitwan Medical College, Nepal
How addicted are newly admitted Undergraduate Medical Students to Smartphones?: a Cross-sectional Study from Chitwan Medical College, Nepal
Abstract
Introduction: Increasing smartphone use among adolescents in todays’ world has made this handy device an indispensable electronic tool, however, it comes at a pric...

