Main Article Content

Abstract

Use of USB drives for transferring digital information is very common and which also a main sources wide variety of malwares to the system. A privately owned smart device that is connected to a corporate LAN network can be a potential USB channel to malware infections. For example, airspace systems are the safest places to store important data. However, unlike network connections, there is no authentication or filtering by USB connection streams. Therefore, a deliberate or un-intentional transmission of a USB device or a mobile device infected with malware in the airspace is sufficient to transfer the infections to those systems. It becomes necessary to identify and analyse such malicious intrusions in order to advance restrictive measures. Honeypots/Honeynets are the devices that support this task, they collect sample for analysing malwares. We provide a new sort of honeypot which it finds malware by mimicking the removable device's software and copying it to the virtual device itself.

Article Details