Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy 2019
DOI: 10.1145/3292006.3300024
|View full text |Cite
|
Sign up to set email alerts
|

Detection of Threats to IoT Devices using Scalable VPN-forwarded Honeypots

Abstract: Attacks on Internet of Things (IoT) devices, exploiting inherent vulnerabilities, have intensified over the last few years. Recent large-scale attacks, such as Persirai, Hakai, etc. corroborate concerns about the security of IoT devices. In this work, we propose an approach that allows easy integration of commercial off-the-shelf IoT devices into a general honeypot architecture. Our approach projects a small number of heterogeneous IoT devices (that are physically at one location) as many (geographically distr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0
1

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
3
1

Relationship

2
8

Authors

Journals

citations
Cited by 36 publications
(15 citation statements)
references
References 16 publications
0
14
0
1
Order By: Relevance
“…Others were related to wireless sensor networks (WSNs) [22][23][24], cloud computing [25], cyber-physical systems [26], and wide area networks (WANs) [27][28][29]. The recent spread of IoT devices has introduced new threats such as botnet attacks [30]. Such attacks appear to compromise the victim devices, and the attacks can be coordinated.…”
Section: Introductionmentioning
confidence: 99%
“…Others were related to wireless sensor networks (WSNs) [22][23][24], cloud computing [25], cyber-physical systems [26], and wide area networks (WANs) [27][28][29]. The recent spread of IoT devices has introduced new threats such as botnet attacks [30]. Such attacks appear to compromise the victim devices, and the attacks can be coordinated.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, we believe future research should focus on providing an external continuous protection that can be easily updated with information on newly discovered attacks. One way to collect intelligence on emerging threats to surveillance systems is to use an advanced honeypot system [29]. Moreover, by identifying emerging exploits, administrators can protect their systems before they get infected.…”
Section: Discussionmentioning
confidence: 99%
“…Tambe et al [86] proposed a scalable high interaction honeypot to attract and detect large scale botnet attacks. In order to solve the scalability problem of high interaction honeypots using real devices, Tambe et al used VPN tunnels which allowed a small number of real IoT devices to appear as multiple IoT devices with different IP addresses around the world.…”
Section: Telnet Ssh Http and Cwmp Attacksmentioning
confidence: 99%