2017 28th Irish Signals and Systems Conference (ISSC) 2017
DOI: 10.1109/issc.2017.7983603
|View full text |Cite
|
Sign up to set email alerts
|

A ZigBee honeypot to assess IoT cyberattack behaviour

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
29
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 62 publications
(29 citation statements)
references
References 11 publications
0
29
0
Order By: Relevance
“…These devices (or software) record malicious activities so that attack vectors and patterns can be further investigated. Given that ZigBee-based IoT devices are actively used in smart cities settings [74], the honeypot that simulates a Zig-Bee gateway proposed by Dowling et al [75] is instrumental to explore attacks against smart cities. After 3-month of monitoring the activity that has targeted the ZigBee gateway, the researchers reported 6 types of executed attacks.…”
Section: Risk Assessment and Threat Intelligencementioning
confidence: 99%
“…These devices (or software) record malicious activities so that attack vectors and patterns can be further investigated. Given that ZigBee-based IoT devices are actively used in smart cities settings [74], the honeypot that simulates a Zig-Bee gateway proposed by Dowling et al [75] is instrumental to explore attacks against smart cities. After 3-month of monitoring the activity that has targeted the ZigBee gateway, the researchers reported 6 types of executed attacks.…”
Section: Risk Assessment and Threat Intelligencementioning
confidence: 99%
“…Therefore, the article proposes honeypot creation by considering probabilistic estimation of honeypot detection. A Zigbee gateway-based honeypot is created in [29], as most of the IoT devices use this protocol at data link layer. The honeypot captures traffic for analysis and compares the individual versus mass attacks in the IoT system.…”
Section: Honeypots For the Iot Networkmentioning
confidence: 99%
“…-Phype [31]: that emulates a Telnet service in order to capture IoT malware, -HoneyThing [32]: emulates a specific IoT protocol: TR-069 (CPE WAN Management Protocol), -IoTPOT [6]: offers a front-end emulating access to a high interaction environment, called IoTBOX, that virtualizes different CPU architectures commonly used by IoT devices, -ZigBee honeypot [33]: emulates a ZigBee gateway, -Multi-purpose IoT honeypot [34]: emulates multiple protocols used by IoT devices such as Telnet, SSH, HTTP, and CWMP.…”
Section: Iot Honeypot Systemsmentioning
confidence: 99%