2018 IEEE Conference on Application, Information and Network Security (AINS) 2018
DOI: 10.1109/ains.2018.8631494
|View full text |Cite
|
Sign up to set email alerts
|

IoT Honeypot: A Review from Researcher's Perspective

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(14 citation statements)
references
References 8 publications
0
14
0
Order By: Relevance
“…Honeypots and honeynets can be classified in various ways. In order to classify the honeypots and honeynets for IoT, IIoT, and CPS in this survey, we build upon prior surveys [12], [24], [25], [28]. However, our classification in this work improves the existing works by identifying some of the recurring key characteristics of the surveyed works.…”
Section: Classification Methodologymentioning
confidence: 99%
See 3 more Smart Citations
“…Honeypots and honeynets can be classified in various ways. In order to classify the honeypots and honeynets for IoT, IIoT, and CPS in this survey, we build upon prior surveys [12], [24], [25], [28]. However, our classification in this work improves the existing works by identifying some of the recurring key characteristics of the surveyed works.…”
Section: Classification Methodologymentioning
confidence: 99%
“…Classification by Purpose: Honeypots can be categorized Fig. 2: Classification categories of honeypots and honeynets for IoT, IIoT, and CPS in which some of the items in the categorization build upon [12], [24], [25], [28]. Details of works corresponding to each category are tabulated in Tables I, II, and III.…”
Section: Classification Methodologymentioning
confidence: 99%
See 2 more Smart Citations
“…The effectiveness and advantages of the implementation of these methods in the energy system were investigated by the authors of [9]. In the materials of works [10,11], the use of a single-board computer Raspberry Pi in systems to ensure network security is investigated and the use of methods to improve performance to ensure stable operation is substantiated.…”
Section: Introductionmentioning
confidence: 99%