2018
DOI: 10.1007/978-3-030-05366-6_33
|View full text |Cite
|
Sign up to set email alerts
|

Attack Detection and Forensics Using Honeypot in IoT Environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 37 publications
(24 citation statements)
references
References 11 publications
0
20
0
Order By: Relevance
“…Honeypot technology [ 23 ] deploys some hosts and network services as decoys to induce attackers to carry out attacks, thereby capturing and analyzing the attack behaviors, understanding the tools and methods used by the supplier, and speculating the intention and motivation of the attack, thereby enhancing its security protection capabilities [ 24 ]. However, it is difficult to deploy a honeypot environment that is not readily perceivable by intruders [ 25 ].…”
Section: Related Workmentioning
confidence: 99%
“…Honeypot technology [ 23 ] deploys some hosts and network services as decoys to induce attackers to carry out attacks, thereby capturing and analyzing the attack behaviors, understanding the tools and methods used by the supplier, and speculating the intention and motivation of the attack, thereby enhancing its security protection capabilities [ 24 ]. However, it is difficult to deploy a honeypot environment that is not readily perceivable by intruders [ 25 ].…”
Section: Related Workmentioning
confidence: 99%
“…It supports integration to ElasticSearch, LogStash, and Kibana for logging, storage, and visualization. It has been used in the IoT honeypot research for Metognon et al [60], IRASSH-T [64], ML-Enhanced Cowrie [66], and Lingenfelter et al [67].…”
Section: A General Application Honeypotsmentioning
confidence: 99%
“…Telnet and SSH Attacks: Shrivastava et al [66] focused on the use of Cowrie Honeypot to detect attacks on IoT devices and created a Machine Learning (ML)-Enhanced Cowrie. They opened the Telnet and SSH ports, and classified requests as malicious payload, SSH attack, XOR DDoS, suspicious, spying, or clean (non-malicious).…”
Section: Semic and Mrdovicmentioning
confidence: 99%
See 1 more Smart Citation
“…Shrivastava et al [24] analyzed commands input into the compromised shell of a Cowrie honeypot [25] to classify different types of attacks. They have classified all the commands into 4 categories -malicious, DDOS, SSH and spying.…”
Section: Related Workmentioning
confidence: 99%