蜜罐
计算机安全
云计算
网络空间
互联网
计算机科学
物联网
服务拒绝攻击
工作(物理)
服务提供商
服务(商务)
网络安全
互联网隐私
万维网
业务
工程类
机械工程
营销
操作系统
作者
Devran Yener,Tansel Özyer,Emin Kuğu
标识
DOI:10.1109/iisec54230.2021.9672371
摘要
While the enormous growth of cyberspace makes life easier, it also brings new challenges to overcome. The concept of the Internet of Things (IoT) is the main actor of this metamorphosis. They are spreading very quickly due to their advantages and cost-effective nature. These systems also cause risky situations by ignoring security requirements. By their nature, honeypots help us to understand and prevent malicious activities by the attackers. Although significant research has been completed by using honeypots, many of them have not evaluated the real-world scenarios, and some of them have covered only the cloud or a single network. Comparison between Internet Service Providers (ISPs) or cloud providers has been neglected. In our work, we try to fill this gap by positioning the Kippo honeypot behind two different ISP lines with some known IoT device credentials. We have collected Kippo logs for a fifteen-day period. The study shows us that all devices can be discovered by mass scan. Therefore, both ISP networks are at the same amount of risk from cyberattacks. Although there was no significant change in the number of attacks per day during the fifteen-day test period, it is quite high compared to previous studies. This comparison highlights the fact that protecting cyber assets is getting harder every year.
科研通智能强力驱动
Strongly Powered by AbleSci AI