Skip to main navigation Skip to search Skip to main content

Threat Detection and Mitigation with Honeypots: A Modular Approach for IoT

Simão Silva, Patrícia R. Sousa, João S. Resende, Luís Antunes

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

A honeypot is a controlled and secure environment to examine different threats and understand attack patterns. Due to the highly dynamic environments, the growing adoption and use of Internet of Things (IoT) devices make configuring honeypots complex. One of the current literature challenges is the need for a honeypot not to be detected by attackers, namely due to the delays that are required to make requests to external and remote servers. This work focuses on deploying honeypots virtually on IOT devices. With this technology, we can use endpoints to send specific honeypots on recent known vulnerabilities on IOT devices to find and notify attacks within the network, as much of this information is verified and made freely available by government entities. Unlike other approaches, the idea is not to have a fixed honeypot but a set of devices that can be used at any time as a honeypot (adapted to the latest threat) to test the network for a possible problem and then report to Threat Sharing Platform (TSP).

Original languageEnglish
Title of host publicationTrust, Privacy and Security in Digital Business
Subtitle of host publication19th International Conference, TrustBus 2022, Vienna, Austria, August 24, 2022, Proceedings
EditorsSokratis Katsikas, Steven Furnell
Place of PublicationCham
PublisherSpringer
Pages66-80
Number of pages15
ISBN (Electronic)978-3-031-17926-6
ISBN (Print)978-3-031-17925-9
DOIs
Publication statusPublished - 6 Oct 2022
Event19th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2022 - Vienna, Austria
Duration: 24 Aug 202224 Aug 2022

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
PublisherSpringer
Volume13582 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference19th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2022
Country/TerritoryAustria
CityVienna
Period24/08/2224/08/22

Keywords

  • CVE
  • Honeypot
  • Internet of Things
  • Intrusion detection
  • Security
  • Vulnerability

Fingerprint

Dive into the research topics of 'Threat Detection and Mitigation with Honeypots: A Modular Approach for IoT'. Together they form a unique fingerprint.

Cite this