SDN-based In-network Honeypot: Preemptively Disrupt and Mislead Attacks in IoT Networks

05/30/2019
by   Hui Lin, et al.
0

Detecting cyber attacks in the network environments used by Internet-of-things (IoT) and preventing them from causing physical perturbations play an important role in delivering dependable services. To achieve this goal, we propose in-network Honeypot based on Software-Defined Networking (SDN) to disrupt and mislead adversaries into exposures while they are in an early stage of preparing an attack. Different from traditional Honeypot requiring dedicated hardware setup, the in-network Honeypot directly reroutes traffic from suspicious nodes and intelligently spoofs the network traffic to them by adding misleading information into normal traffic. Preliminary evaluations on real networks demonstrate that the in-network Honeypot can have little impacts on the performance of IoT networks.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/15/2021

SDN-Based Intrusion Detection System for Early Detection and Mitigation of DDoS Attacks

The current paper addresses relevant network security vulnerabilities in...
research
06/29/2020

Flexible IoT Datapath Programming using P4

The progress of the network and device technologies enables any device t...
research
05/15/2020

SDN Enabled and OpenFlow Compatible Network Performance Monitoring System

Network performance monitoring holds a pivotal role in improving the ove...
research
08/25/2018

Detection and Mitigation of Attacks on Transportation Networks as a Multi-Stage Security Game

In recent years, state-of-the-art traffic-control devices have evolved f...
research
03/18/2019

Enabling Multi-hop Forwarding in 6LoWPANs through Software-Defined Networking

Wireless Sensor Networks (WSNs) play a major role in the expansion of th...
research
09/05/2019

Using Cyber Threat Intelligence to Prevent Malicious Known Traffic in a SDN Physical Testbed

Since the use of applications and communication tools has increased, one...
research
12/28/2018

Do we have the time for IRM?: Service denial attacks and SDN-based defences

Distributed sensor networks such as IoT deployments generate large quant...

Please sign up or login with your details

Forgot password? Click here to reset