IoT honeypot: A review from researcher's perspective
Internet of things; Malware; Security of data; Attack patterns; Deception toolkits; Honeypots; Malware attacks; Popular platform; Network security
Saved in:
Main Authors: | , , , , |
---|---|
Other Authors: | |
Format: | Conference Paper |
Published: |
Institute of Electrical and Electronics Engineers Inc.
2023
|
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.uniten.dspace-24807 |
---|---|
record_format |
dspace |
spelling |
my.uniten.dspace-248072023-05-29T15:27:21Z IoT honeypot: A review from researcher's perspective Razali M.F. Muruti G. Razali M.N. Jamil N. Mansor F.Z. 57208046981 57202611569 57219263026 36682671900 57195539660 Internet of things; Malware; Security of data; Attack patterns; Deception toolkits; Honeypots; Malware attacks; Popular platform; Network security Honeypot is a tool with an isolated and separated network that mimic a real valuable network that would be of value for attackers. It can be seen as a fake system that looks like a real one with an aim to attract attackers to fall into it and thus monitor the interaction between attackers and the infected device. As the time flow, honeypot has become one of an important subject to researchers in information security for attack recognition and deception toolkit. The present considers implementing honeypot on IoT since IoT device demands target of attackers, plus it is one of the popular platforms in this century. With the fast progression of computer and Internet, a honeypot can provide us with the information of malware attack or even the attack patterns. In this paper, a survey of honeypot in IoT is presented. � 2018 IEEE Final 2023-05-29T07:27:21Z 2023-05-29T07:27:21Z 2019 Conference Paper 10.1109/IISA.2018.8631494 2-s2.0-85062853890 https://www.scopus.com/inward/record.uri?eid=2-s2.0-85062853890&doi=10.1109%2fIISA.2018.8631494&partnerID=40&md5=ea819284085cd07c669ff92d7e5fb5a7 https://irepository.uniten.edu.my/handle/123456789/24807 8631494 93 98 Institute of Electrical and Electronics Engineers Inc. Scopus |
institution |
Universiti Tenaga Nasional |
building |
UNITEN Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Tenaga Nasional |
content_source |
UNITEN Institutional Repository |
url_provider |
http://dspace.uniten.edu.my/ |
description |
Internet of things; Malware; Security of data; Attack patterns; Deception toolkits; Honeypots; Malware attacks; Popular platform; Network security |
author2 |
57208046981 |
author_facet |
57208046981 Razali M.F. Muruti G. Razali M.N. Jamil N. Mansor F.Z. |
format |
Conference Paper |
author |
Razali M.F. Muruti G. Razali M.N. Jamil N. Mansor F.Z. |
spellingShingle |
Razali M.F. Muruti G. Razali M.N. Jamil N. Mansor F.Z. IoT honeypot: A review from researcher's perspective |
author_sort |
Razali M.F. |
title |
IoT honeypot: A review from researcher's perspective |
title_short |
IoT honeypot: A review from researcher's perspective |
title_full |
IoT honeypot: A review from researcher's perspective |
title_fullStr |
IoT honeypot: A review from researcher's perspective |
title_full_unstemmed |
IoT honeypot: A review from researcher's perspective |
title_sort |
iot honeypot: a review from researcher's perspective |
publisher |
Institute of Electrical and Electronics Engineers Inc. |
publishDate |
2023 |
_version_ |
1806427292150267904 |
score |
13.222552 |