Skip to main content

A Comprehensive Methodology for Deploying IoT Honeypots

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11033))

Abstract

Recent news have raised concern regarding the security on the IoT field. Vulnerabilities in devices are arising and honeypots are an excellent way to cope with this problem. In this work, current solutions for honeypots in the IoT context, and other solutions adaptable to it are analyzed in order to set the basis for a methodology that allows deployment of IoT honeypots. This methodology aims to cover all the aspects needed, including which devices are interesting, how can attackers be attracted to the honeypot, and how to obtain useful info from the deployment.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Danova, T.: 75 billion devices will be connected to the internet of things by 2020. Business Insider, vol. 2 (2013)

    Google Scholar 

  2. Roman, R., Najera, P., Lopez, J.: Securing the internet of things. Computer 44(9), 51–58 (2011)

    Article  Google Scholar 

  3. Kambourakis, G., Kolias, C., Stavrou, A.: The mirai botnet and the IoT zombie armies. In: Military Communications Conference (MILCOM) MILCOM 2017 IEEE, pp. 267–272. IEEE (2017)

    Google Scholar 

  4. Business Insider: This one chart explains why cybersecurity is so important. Retriev. August 16, 2016 (2016)

    Google Scholar 

  5. Nawrocki, M., Wählisch, M., Schmidt, T.C., Keil, C., Schönfelder, J.: A survey on honeypot software and data analysis, arXiv preprint arXiv:1608.06249 (2016)

  6. Pa, Y.M.P., Suzuki, S., Yoshioka, K., Matsumoto, T., Kasama, T., Rossow, C.: IOTPOT: analysing the rise of IOT compromises. EMU 9, 1 (2015)

    Google Scholar 

  7. Guarnizo, J.D., et al.: SIPHON: Towards scalable high-interaction physical honeypots. In: Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, pp. 57–68. ACM (2017)

    Google Scholar 

  8. Luo, T., Xu, Z., Jin, X., Jia, Y., Ouyang, X.: IoTCandyJar: towards an intelligent-interaction honeypot for IoT devices. Black Hat (2017)

    Google Scholar 

  9. Krishnaprasad, P.: Capturing attacks on IoT devices with a multi-purpose IoT honeypot. Ph.D. dissertation, Indian Institute of Technology Kanpur (2017)

    Google Scholar 

  10. Radice, A.: Playing with a mirai honeypot: Mtpot (2017)

    Google Scholar 

  11. Wang, M., Santillan, J., Kuipers, F.: ThingPot: an interactive Internet-of-Things honeypot (2017)

    Google Scholar 

  12. Dowling, S., Schukat, M., Melvin, H.: A ZigBee honeypot to assess IoT cyberattack behaviour. In: Signals and Systems Conference (ISSC) : 28th Irish IEEE 2017, pp. 1–6 (2017)

    Google Scholar 

  13. Jicha, A., Patton, M., Chen, H.: SCADA honeypots: an in-depth analysis of Conpot. In: Intelligence and Security Informatics (ISI) IEEE Conference on 2016, pp. 196–198. IEEE (2016)

    Google Scholar 

  14. Singh, J.P., Chauhan, A.: Detection and prevention of non-pc Botnets

    Google Scholar 

  15. Wardak, H., Zhioua, S., Almulhem, A.: PLC access control: a security analysis. In: World Congress on 2016 Industrial Control Systems Security (WCICSS), pp. 1–6. IEEE (2016)

    Google Scholar 

  16. Trujano, G.B.R.R.F., Chan, B., Beams, G., Rivera, R.: Security analysis of DJI phantom 3 standard. Mass. Inst. Technol. (2016)

    Google Scholar 

  17. Szabo, M.: Drone hacking (2017)

    Google Scholar 

  18. Fox-Brewster, T.: Watch a very vulnerable USD140 Quadcopter drone get hacked out of the sky (2017)

    Google Scholar 

  19. Hughes, M.: Why the iKettle hack should worry you (even if you don’t own one) (2015)

    Google Scholar 

  20. PenTestPartners: Hacking defcon 23’s IoT village samsung fridge (2015)

    Google Scholar 

  21. Munro, K.: Extracting your WPA-PSK from bathroom scales (2015)

    Google Scholar 

  22. Ronen, E., Shamir, A., Weingarten, A.-O., O’Flynn, C.: IoT goes nuclear: creating a ZigBee chain reaction. In: IEEE Symposium on 2017 Security and Privacy (SP), pp. 195–212. IEEE (2017)

    Google Scholar 

  23. Hern, A.: CloudPets stuffed toys leak details of half a million users (2017)

    Google Scholar 

  24. Lab, K.: A windows-based spreader for MIRAI malware has been discovered (2017)

    Google Scholar 

  25. Edwards, S., Profetis, I.: Hajime: analysis of a decentralized internet worm for IoT devices. Rapidity Netw. 16 (2016)

    Google Scholar 

Download references

Acknowledgement

This work has been financed by Ministerio de Economía y Competitividad through the projects IoTest (TIN2015-72634-EXP) and SMOG (TIN2016-79095-C2-1-R). The second author has been financed by INCIBE through the grant program for excellency in advanced cybersecurity research teams.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Antonio Acien .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Acien, A., Nieto, A., Fernandez, G., Lopez, J. (2018). A Comprehensive Methodology for Deploying IoT Honeypots. In: Furnell, S., Mouratidis, H., Pernul, G. (eds) Trust, Privacy and Security in Digital Business. TrustBus 2018. Lecture Notes in Computer Science(), vol 11033. Springer, Cham. https://doi.org/10.1007/978-3-319-98385-1_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-98385-1_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-98384-4

  • Online ISBN: 978-3-319-98385-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics