Autor: |
LAZAR, Alexandru, BLAGA, Tudor-Mihai, ZINCA, Daniel, DOBROTA, Virgil |
Předmět: |
|
Zdroj: |
Acta Technica Napocensis. Electronica-Telecomunicatii; 2023, Vol. 63 Issue 2, p7-18, 12p |
Abstrakt: |
For a better awareness of the tactics employed by the malicious entities in Internet of Things, a system called Honeypot tricks the attackers into exploiting its "sweet" fake resources. While implementing nine types of devices only six of those were attacked. Despite this, the honeypot managed to capture attacks destined for three devices that were not implemented. Overall, several real-world attacks were captured and analyzed providing different indicators of compromise. No new threats were identified but the server only ran for a short period of time and with limited resources. This approach looks like a promising avenue for creating attacker profiles and collecting data on botnet behavior. [ABSTRACT FROM AUTHOR] |
Databáze: |
Complementary Index |
Externí odkaz: |
|