IoT honeypot: A review from researcher's perspective

Honeypot is a tool with an isolated and separated network that mimic a real valuable network that would be of value for attackers. It can be seen as a fake system that looks like a real one with an aim to attract attackers to fall into it and thus monitor the interaction between attackers and the in...

Full description

Saved in:
Bibliographic Details
Main Authors: Razali, M.F., Muruti, G., Razali, M.N., Jamil, N., Mansor, F.Z.
Format: Conference Paper
Language:English
Published: 2020
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.uniten.dspace-13169
record_format dspace
spelling my.uniten.dspace-131692020-03-17T05:05:22Z IoT honeypot: A review from researcher's perspective Razali, M.F. Muruti, G. Razali, M.N. Jamil, N. Mansor, F.Z. Honeypot is a tool with an isolated and separated network that mimic a real valuable network that would be of value for attackers. It can be seen as a fake system that looks like a real one with an aim to attract attackers to fall into it and thus monitor the interaction between attackers and the infected device. As the time flow, honeypot has become one of an important subject to researchers in information security for attack recognition and deception toolkit. The present considers implementing honeypot on IoT since IoT device demands target of attackers, plus it is one of the popular platforms in this century. With the fast progression of computer and Internet, a honeypot can provide us with the information of malware attack or even the attack patterns. In this paper, a survey of honeypot in IoT is presented. © 2018 IEEE 2020-02-03T03:30:52Z 2020-02-03T03:30:52Z 2019 Conference Paper 10.1109/IISA.2018.8631494 en
institution Universiti Tenaga Nasional
building UNITEN Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Tenaga Nasional
content_source UNITEN Institutional Repository
url_provider http://dspace.uniten.edu.my/
language English
description Honeypot is a tool with an isolated and separated network that mimic a real valuable network that would be of value for attackers. It can be seen as a fake system that looks like a real one with an aim to attract attackers to fall into it and thus monitor the interaction between attackers and the infected device. As the time flow, honeypot has become one of an important subject to researchers in information security for attack recognition and deception toolkit. The present considers implementing honeypot on IoT since IoT device demands target of attackers, plus it is one of the popular platforms in this century. With the fast progression of computer and Internet, a honeypot can provide us with the information of malware attack or even the attack patterns. In this paper, a survey of honeypot in IoT is presented. © 2018 IEEE
format Conference Paper
author Razali, M.F.
Muruti, G.
Razali, M.N.
Jamil, N.
Mansor, F.Z.
spellingShingle Razali, M.F.
Muruti, G.
Razali, M.N.
Jamil, N.
Mansor, F.Z.
IoT honeypot: A review from researcher's perspective
author_facet Razali, M.F.
Muruti, G.
Razali, M.N.
Jamil, N.
Mansor, F.Z.
author_sort Razali, M.F.
title IoT honeypot: A review from researcher's perspective
title_short IoT honeypot: A review from researcher's perspective
title_full IoT honeypot: A review from researcher's perspective
title_fullStr IoT honeypot: A review from researcher's perspective
title_full_unstemmed IoT honeypot: A review from researcher's perspective
title_sort iot honeypot: a review from researcher's perspective
publishDate 2020
_version_ 1662758824721776640
score 13.209306