SECURITY ISSUES IN INTERNET OF THINGS BOTNETS: A HIGH INTERACTION HONEYPOT APPROACH

dc.contributor.authorLAZAR Alexandru
dc.contributor.authorBLAGA Tudor-Mihai
dc.contributor.authorZINCA Daniel
dc.contributor.authorDOBROTA Virgil
dc.date.accessioned2025-04-21T13:05:35Z
dc.date.issued2023-12-11
dc.description.abstractFor a better awareness of the tactics employed by the malicious entities in Internet of Things, a system called Honeypot tricks the attackers into exploiting its “sweet” fake resources. While implementing nine types of devices only six of those were attacked. Despite this, the honeypot managed to capture attacks destined for three devices that were not implemented. Overall, several real-world attacks were captured and analyzed providing different indicators of compromise. No new threats were identified but the server only ran for a short period of time and with limited resources. This approach looks like a promising avenue for creating attacker profiles and collecting data on botnet behavior.
dc.identifier.issn1221 – 6542
dc.identifier.urihttps://oasis.utcluj.app/handle/123456789/686
dc.language.isoen
dc.publisherTechnical University of Cluj-Napoca
dc.relation.ispartofseries63; 2
dc.subjectbotnet
dc.subjectexploit
dc.subjecthoneypot
dc.subjectIoT.
dc.titleSECURITY ISSUES IN INTERNET OF THINGS BOTNETS: A HIGH INTERACTION HONEYPOT APPROACH
dc.typedataset

Fișiere

Pachet original

Acum arăt 1 - 1 din 1
Imagine miniatură
Nume:
L2_Security_Issues_in_IOT_Botnets_A_High_Interaction_Honeypot_Approach.pdf
Dimensiune:
768.74 KB
Format:
Adobe Portable Document Format

Pachet licență

Acum arăt 1 - 1 din 1
Miniatură indisponibilă
Nume:
license.txt
Dimensiune:
1.71 KB
Format:
Item-specific license agreed to upon submission
Descriere: