AIIPot: adaptive intelligent-interaction honeypot for IoT devices
AIIPot: adaptive intelligent-interaction honeypot for IoT devices
The proliferation of the Internet of Things (IoT) has raised concerns about the security of connected devices. There is a need to develop suitable and cost-efficient methods to identify vulnerabilities in IoT devices to address them before attackers seize opportunities to compromise them. The deception technique is a prominent approach to improving the security posture of IoT systems. Honeypot is a popular deception technique that mimics interaction in real fashion and encourages unauthorised users (attackers) to launch attacks. Due to the large number and the heterogeneity of IoT devices, manually crafting the low and high-interaction honeypots is not affordable. This has forced researchers to seek innovative ways to build honeypots for IoT devices. In this paper, we propose a honeypot for IoT devices that uses machine learning techniques to learn and interact with attackers automatically. The evaluation of the proposed model indicates that our system can improve the session length with attackers and capture more attacks on the IoT network.
Mfogo, Volviane Saphir
4d961a33-19af-4e4d-a2a8-5b7be36bec2b
Zemkoho, Alain
30c79e30-9879-48bd-8d0b-e2fbbc01269e
Njilla, Laurent
e3080135-a677-4208-ada9-f1bc90a36118
Nkenlifack, Marcellin
4b90915c-3f06-4a5b-b4d1-818bb26a3eef
Kamhoua, Charles
3da843b0-d1c9-48a7-94bc-fe65bb09307d
Mfogo, Volviane Saphir
4d961a33-19af-4e4d-a2a8-5b7be36bec2b
Zemkoho, Alain
30c79e30-9879-48bd-8d0b-e2fbbc01269e
Njilla, Laurent
e3080135-a677-4208-ada9-f1bc90a36118
Nkenlifack, Marcellin
4b90915c-3f06-4a5b-b4d1-818bb26a3eef
Kamhoua, Charles
3da843b0-d1c9-48a7-94bc-fe65bb09307d
Mfogo, Volviane Saphir, Zemkoho, Alain, Njilla, Laurent, Nkenlifack, Marcellin and Kamhoua, Charles
(2023)
AIIPot: adaptive intelligent-interaction honeypot for IoT devices.
In 2023 IEEE 34th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC).
IEEE.
6 pp
.
(doi:10.1109/PIMRC56721.2023.10293827).
Record type:
Conference or Workshop Item
(Paper)
Abstract
The proliferation of the Internet of Things (IoT) has raised concerns about the security of connected devices. There is a need to develop suitable and cost-efficient methods to identify vulnerabilities in IoT devices to address them before attackers seize opportunities to compromise them. The deception technique is a prominent approach to improving the security posture of IoT systems. Honeypot is a popular deception technique that mimics interaction in real fashion and encourages unauthorised users (attackers) to launch attacks. Due to the large number and the heterogeneity of IoT devices, manually crafting the low and high-interaction honeypots is not affordable. This has forced researchers to seek innovative ways to build honeypots for IoT devices. In this paper, we propose a honeypot for IoT devices that uses machine learning techniques to learn and interact with attackers automatically. The evaluation of the proposed model indicates that our system can improve the session length with attackers and capture more attacks on the IoT network.
This record has no associated files available for download.
More information
Accepted/In Press date: 5 September 2023
e-pub ahead of print date: 31 October 2023
Venue - Dates:
2023 IEEE 34th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Toronto, ON, Canada, 2023-09-05 - 2023-09-08
Identifiers
Local EPrints ID: 486803
URI: http://eprints.soton.ac.uk/id/eprint/486803
ISSN: 2166-9589
PURE UUID: dfe71ced-8daa-49e1-8021-f40ce869e48d
Catalogue record
Date deposited: 06 Feb 2024 17:42
Last modified: 18 Mar 2024 03:31
Export record
Altmetrics
Contributors
Author:
Volviane Saphir Mfogo
Author:
Laurent Njilla
Author:
Marcellin Nkenlifack
Author:
Charles Kamhoua
Download statistics
Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.
View more statistics