Publication:
IoT honeypot: A review from researcher's perspective

dc.citedby9
dc.contributor.authorRazali M.F.en_US
dc.contributor.authorMuruti G.en_US
dc.contributor.authorRazali M.N.en_US
dc.contributor.authorJamil N.en_US
dc.contributor.authorMansor F.Z.en_US
dc.contributor.authorid57208046981en_US
dc.contributor.authorid57202611569en_US
dc.contributor.authorid57219263026en_US
dc.contributor.authorid36682671900en_US
dc.contributor.authorid57195539660en_US
dc.date.accessioned2023-05-29T07:27:21Z
dc.date.available2023-05-29T07:27:21Z
dc.date.issued2019
dc.descriptionInternet of things; Malware; Security of data; Attack patterns; Deception toolkits; Honeypots; Malware attacks; Popular platform; Network securityen_US
dc.description.abstractHoneypot is a tool with an isolated and separated network that mimic a real valuable network that would be of value for attackers. It can be seen as a fake system that looks like a real one with an aim to attract attackers to fall into it and thus monitor the interaction between attackers and the infected device. As the time flow, honeypot has become one of an important subject to researchers in information security for attack recognition and deception toolkit. The present considers implementing honeypot on IoT since IoT device demands target of attackers, plus it is one of the popular platforms in this century. With the fast progression of computer and Internet, a honeypot can provide us with the information of malware attack or even the attack patterns. In this paper, a survey of honeypot in IoT is presented. � 2018 IEEEen_US
dc.description.natureFinalen_US
dc.identifier.ArtNo8631494
dc.identifier.doi10.1109/IISA.2018.8631494
dc.identifier.epage98
dc.identifier.scopus2-s2.0-85062853890
dc.identifier.spage93
dc.identifier.urihttps://www.scopus.com/inward/record.uri?eid=2-s2.0-85062853890&doi=10.1109%2fIISA.2018.8631494&partnerID=40&md5=ea819284085cd07c669ff92d7e5fb5a7
dc.identifier.urihttps://irepository.uniten.edu.my/handle/123456789/24807
dc.publisherInstitute of Electrical and Electronics Engineers Inc.en_US
dc.sourceScopus
dc.sourcetitle2018 IEEE Conference on Application, Information and Network Security, AINS 2018
dc.titleIoT honeypot: A review from researcher's perspectiveen_US
dc.typeConference Paperen_US
dspace.entity.typePublication
Files
Collections