IoT honeypot

A review from researcher's perspective

Mohamad Faiz Razali, Gopinath Muruti, Muhammad Nazim Razali, Norziana Jamil, Fawwaz Zamir Mansor

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Honeypot is a tool with an isolated and separated network that mimic a real valuable network that would be of value for attackers. It can be seen as a fake system that looks like a real one with an aim to attract attackers to fall into it and thus monitor the interaction between attackers and the infected device. As the time flow, honeypot has become one of an important subject to researchers in information security for attack recognition and deception toolkit. The present considers implementing honeypot on IoT since IoT device demands target of attackers, plus it is one of the popular platforms in this century. With the fast progression of computer and Internet, a honeypot can provide us with the information of malware attack or even the attack patterns. In this paper, a survey of honeypot in IoT is presented.

Original languageEnglish
Title of host publication2018 IEEE Conference on Application, Information and Network Security, AINS 2018
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages93-98
Number of pages6
ISBN (Electronic)9781538669259
DOIs
Publication statusPublished - 31 Jan 2019
Event2018 IEEE Conference on Application, Information and Network Security, AINS 2018 - Langkawi, Kedah, Malaysia
Duration: 21 Nov 201822 Nov 2018

Publication series

Name2018 IEEE Conference on Application, Information and Network Security, AINS 2018

Conference

Conference2018 IEEE Conference on Application, Information and Network Security, AINS 2018
CountryMalaysia
CityLangkawi, Kedah
Period21/11/1822/11/18

Fingerprint

Security of data
Internet
Internet of things
Malware

All Science Journal Classification (ASJC) codes

  • Software
  • Computer Networks and Communications
  • Safety, Risk, Reliability and Quality

Cite this

Razali, M. F., Muruti, G., Razali, M. N., Jamil, N., & Mansor, F. Z. (2019). IoT honeypot: A review from researcher's perspective. In 2018 IEEE Conference on Application, Information and Network Security, AINS 2018 (pp. 93-98). [8631494] (2018 IEEE Conference on Application, Information and Network Security, AINS 2018). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/IISA.2018.8631494
Razali, Mohamad Faiz ; Muruti, Gopinath ; Razali, Muhammad Nazim ; Jamil, Norziana ; Mansor, Fawwaz Zamir. / IoT honeypot : A review from researcher's perspective. 2018 IEEE Conference on Application, Information and Network Security, AINS 2018. Institute of Electrical and Electronics Engineers Inc., 2019. pp. 93-98 (2018 IEEE Conference on Application, Information and Network Security, AINS 2018).
@inproceedings{9b32b6312d8941a59574328a99f7fb31,
title = "IoT honeypot: A review from researcher's perspective",
abstract = "Honeypot is a tool with an isolated and separated network that mimic a real valuable network that would be of value for attackers. It can be seen as a fake system that looks like a real one with an aim to attract attackers to fall into it and thus monitor the interaction between attackers and the infected device. As the time flow, honeypot has become one of an important subject to researchers in information security for attack recognition and deception toolkit. The present considers implementing honeypot on IoT since IoT device demands target of attackers, plus it is one of the popular platforms in this century. With the fast progression of computer and Internet, a honeypot can provide us with the information of malware attack or even the attack patterns. In this paper, a survey of honeypot in IoT is presented.",
author = "Razali, {Mohamad Faiz} and Gopinath Muruti and Razali, {Muhammad Nazim} and Norziana Jamil and Mansor, {Fawwaz Zamir}",
year = "2019",
month = "1",
day = "31",
doi = "10.1109/IISA.2018.8631494",
language = "English",
series = "2018 IEEE Conference on Application, Information and Network Security, AINS 2018",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
pages = "93--98",
booktitle = "2018 IEEE Conference on Application, Information and Network Security, AINS 2018",
address = "United States",

}

Razali, MF, Muruti, G, Razali, MN, Jamil, N & Mansor, FZ 2019, IoT honeypot: A review from researcher's perspective. in 2018 IEEE Conference on Application, Information and Network Security, AINS 2018., 8631494, 2018 IEEE Conference on Application, Information and Network Security, AINS 2018, Institute of Electrical and Electronics Engineers Inc., pp. 93-98, 2018 IEEE Conference on Application, Information and Network Security, AINS 2018, Langkawi, Kedah, Malaysia, 21/11/18. https://doi.org/10.1109/IISA.2018.8631494

IoT honeypot : A review from researcher's perspective. / Razali, Mohamad Faiz; Muruti, Gopinath; Razali, Muhammad Nazim; Jamil, Norziana; Mansor, Fawwaz Zamir.

2018 IEEE Conference on Application, Information and Network Security, AINS 2018. Institute of Electrical and Electronics Engineers Inc., 2019. p. 93-98 8631494 (2018 IEEE Conference on Application, Information and Network Security, AINS 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - IoT honeypot

T2 - A review from researcher's perspective

AU - Razali, Mohamad Faiz

AU - Muruti, Gopinath

AU - Razali, Muhammad Nazim

AU - Jamil, Norziana

AU - Mansor, Fawwaz Zamir

PY - 2019/1/31

Y1 - 2019/1/31

N2 - Honeypot is a tool with an isolated and separated network that mimic a real valuable network that would be of value for attackers. It can be seen as a fake system that looks like a real one with an aim to attract attackers to fall into it and thus monitor the interaction between attackers and the infected device. As the time flow, honeypot has become one of an important subject to researchers in information security for attack recognition and deception toolkit. The present considers implementing honeypot on IoT since IoT device demands target of attackers, plus it is one of the popular platforms in this century. With the fast progression of computer and Internet, a honeypot can provide us with the information of malware attack or even the attack patterns. In this paper, a survey of honeypot in IoT is presented.

AB - Honeypot is a tool with an isolated and separated network that mimic a real valuable network that would be of value for attackers. It can be seen as a fake system that looks like a real one with an aim to attract attackers to fall into it and thus monitor the interaction between attackers and the infected device. As the time flow, honeypot has become one of an important subject to researchers in information security for attack recognition and deception toolkit. The present considers implementing honeypot on IoT since IoT device demands target of attackers, plus it is one of the popular platforms in this century. With the fast progression of computer and Internet, a honeypot can provide us with the information of malware attack or even the attack patterns. In this paper, a survey of honeypot in IoT is presented.

UR - http://www.scopus.com/inward/record.url?scp=85062853890&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85062853890&partnerID=8YFLogxK

U2 - 10.1109/IISA.2018.8631494

DO - 10.1109/IISA.2018.8631494

M3 - Conference contribution

T3 - 2018 IEEE Conference on Application, Information and Network Security, AINS 2018

SP - 93

EP - 98

BT - 2018 IEEE Conference on Application, Information and Network Security, AINS 2018

PB - Institute of Electrical and Electronics Engineers Inc.

ER -

Razali MF, Muruti G, Razali MN, Jamil N, Mansor FZ. IoT honeypot: A review from researcher's perspective. In 2018 IEEE Conference on Application, Information and Network Security, AINS 2018. Institute of Electrical and Electronics Engineers Inc. 2019. p. 93-98. 8631494. (2018 IEEE Conference on Application, Information and Network Security, AINS 2018). https://doi.org/10.1109/IISA.2018.8631494