AIIPot: Adaptive Intelligent-Interaction Honeypot for IoT Devices

03/22/2023
by   Volviane Saphir Mfogo, et al.
0

The proliferation of the Internet of Things (IoT) has raised concerns about the security of connected devices. There is a need to develop suitable and cost-efficient methods to identify vulnerabilities in IoT devices in order to address them before attackers seize opportunities to compromise them. The deception technique is a prominent approach to improving the security posture of IoT systems. Honeypot is a popular deception technique that mimics interaction in real fashion and encourages unauthorised users (attackers) to launch attacks. Due to the large number and the heterogeneity of IoT devices, manually crafting the low and high-interaction honeypots is not affordable. This has forced researchers to seek innovative ways to build honeypots for IoT devices. In this paper, we propose a honeypot for IoT devices that uses machine learning techniques to learn and interact with attackers automatically. The evaluation of the proposed model indicates that our system can improve the session length with attackers and capture more attacks on the IoT network.

READ FULL TEXT

page 1

page 6

research
05/10/2023

HoneyIoT: Adaptive High-Interaction Honeypot for IoT Devices Through Reinforcement Learning

As IoT devices are becoming widely deployed, there exist many threats to...
research
12/01/2020

Towards a Universal Features Set for IoT Botnet Attacks Detection

The security pitfalls of IoT devices make it easy for the attackers to e...
research
05/03/2019

HADES-IoT: A Practical Host-Based Anomaly Detection System for IoT Devices (Extended Version)

Internet of Things (IoT) devices have become ubiquitous and are spread a...
research
07/11/2018

ThingPot: an interactive Internet-of-Things honeypot

The Mirai Distributed Denial-of-Service (DDoS) attack exploited security...
research
06/25/2020

Adversarial Machine Learning based Partial-model Attack in IoT

As Internet of Things (IoT) has emerged as the next logical stage of the...
research
12/08/2018

IoT Lotto: Utilizing IoT Devices in Brute-Force Attacks

The number of IoT devices in use is increasing rapidly and so is the num...
research
05/01/2023

IoTFlowGenerator: Crafting Synthetic IoT Device Traffic Flows for Cyber Deception

Over the years, honeypots emerged as an important security tool to under...

Please sign up or login with your details

Forgot password? Click here to reset