IoT honeypot: A review from researcher's perspective

Mohamad Faiz Razali, Gopinath Muruti, Muhammad Nazim Razali, Norziana Jamil, Fawwaz Zamir Mansor

Research output: Chapter in Book/Report/Conference proceedingConference contribution

18 Citations (Scopus)

Abstract

Honeypot is a tool with an isolated and separated network that mimic a real valuable network that would be of value for attackers. It can be seen as a fake system that looks like a real one with an aim to attract attackers to fall into it and thus monitor the interaction between attackers and the infected device. As the time flow, honeypot has become one of an important subject to researchers in information security for attack recognition and deception toolkit. The present considers implementing honeypot on IoT since IoT device demands target of attackers, plus it is one of the popular platforms in this century. With the fast progression of computer and Internet, a honeypot can provide us with the information of malware attack or even the attack patterns. In this paper, a survey of honeypot in IoT is presented.

Original languageEnglish
Title of host publication2018 IEEE Conference on Application, Information and Network Security, AINS 2018
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages93-98
Number of pages6
ISBN (Electronic)9781538669259
DOIs
Publication statusPublished - Jul 2 2018
Externally publishedYes
Event2018 IEEE Conference on Application, Information and Network Security, AINS 2018 - Langkawi, Kedah, Malaysia
Duration: Nov 21 2018Nov 22 2018

Publication series

Name2018 IEEE Conference on Application, Information and Network Security, AINS 2018

Conference

Conference2018 IEEE Conference on Application, Information and Network Security, AINS 2018
Country/TerritoryMalaysia
CityLangkawi, Kedah
Period11/21/1811/22/18

Keywords

  • Honeypot
  • Information security
  • Internet of things

ASJC Scopus subject areas

  • Safety, Risk, Reliability and Quality
  • Software
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'IoT honeypot: A review from researcher's perspective'. Together they form a unique fingerprint.

Cite this