Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3321408.3321589acmotherconferencesArticle/Chapter ViewAbstractPublication Pagesacm-turcConference Proceedingsconference-collections
research-article

Chameleon: towards adaptive honeypot for internet of things

Published: 17 May 2019 Publication History

Abstract

Nowadays, more and more Internet of Things (IoT) devices are exposed to the Internet and face increasing threats. These devices always have low computing resources and have no antivirus installed. Honeypot is widely used to collect and predict potential threats. Traditional honeypots are designed for a specific device, however, cannot work well for the large amount and even emerging diverse IoT devices. We propose Chameleon, an adaptive honeypot for diverse IoT devices. Given a target IoT device, Chameleon forwards the received network traffic to the target device while ensuring the security. Chameleon stores the requests and responses from the interaction with the target device for further requests. Then Chameleon generates appropriate responses to avoid being fingerprinted by attackers. We deploy Chameleon to simulate different IoT devices. The evaluation results show that Chameleon can simulate most of the IoT devices while passing the state-of-the-art honeypot fingerprinting tools.

References

[1]
Michael J Covington and Rush Carskadden. Threat implications of the internet of things. In Cyber Conflict (CyCon), 2013 5th International Conference on, pages 1--12. IEEE, 2013.
[2]
Dlink dcs-930l camera vulnerability. http://securityaffairs.co/wordpress/49143/breaking-news/d-link.html.
[3]
Gordon Fyodor Lyon. Nmap network scanning: The official Nmap project guide to network discovery and security scanning. Insecure, 2009.
[4]
Shodan.io, the first search engine for internet-connected devices. https://shodan.io/.
[5]
Michael Müter, Felix Freiling, Thorsten Holz, and Jeanna Matthews. A generic toolkit for converting web applications into high-interaction honeypots. University of Mannheim, 280:6--1, 2008.
[6]
honssh github. https://github.com/tnich/honssh.
[7]
Developments of the honeyd virtual honeypot. http://www.honeyd.org/.
[8]
Xuewu Liu, Lingyi Peng, and Chaoliang Li. The dynamic honeypot design and implementation based on honeyd. In International Conference on Computer Science, Environment, Ecoinformatics, and Education, pages 93--98. Springer, 2011.
[9]
Kfsensor, windows honeypot ids. http://www.keyfocus.net/kfsensor/.
[10]
Dionaea catches bugs. http://dionaea.carnivore.it/.
[11]
Conpot. https://github.com/mushorg/conpot/.
[12]
Glastopf github. https://github.com/mushorg/glastopf.
[13]
Tongbo Luo, Zhaoyan Xu, Xing Jin, Yanhui Jia, and Xin Ouyang. Iot-candyjar: Towards an intelligent-interaction honeypot for iot devices. Black Hat, 2017.
[14]
Meng Wang, Javier Santillan, and Fernando Kuipers. Thingpot: an interactive internet-of-things honeypot. 2017.
[15]
Lance Spitzner. The honeynet project: Trapping the hackers. IEEE Security & Privacy, 99(2):15--23, 2003.
[16]
Yin Minn Pa Pa, Shogo Suzuki, Katsunari Yoshioka, Tsutomu Matsumoto, Takahiro Kasama, and Christian Rossow. Iotpot: analysing the rise of iot compromises. EMU, 9:1, 2015.
[17]
Alejandro Guerra Manzanares. Honeyio4: the construction of a virtual, low-interaction iot honeypot. B.S. thesis, Universitat Politècnica de Catalunya, 2017.

Cited By

View all
  • (2024)Intelligent Insight into IoT Threats: Leveraging Advanced Analytics with Honeypots for Anomaly Detection2024 IEEE 9th International Conference for Convergence in Technology (I2CT)10.1109/I2CT61223.2024.10543511(1-6)Online publication date: 5-Apr-2024
  • (2024)Securing smart cities through machine learning: A honeypot‐driven approach to attack detection in Internet of Things ecosystemsIET Smart Cities10.1049/smc2.12084Online publication date: 29-May-2024
  • (2023)Designing and Evaluating a Flexible and Scalable HTTP Honeypot Platform: Architecture, Implementation, and ApplicationsElectronics10.3390/electronics1216348012:16(3480)Online publication date: 17-Aug-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ACM TURC '19: Proceedings of the ACM Turing Celebration Conference - China
May 2019
963 pages
ISBN:9781450371582
DOI:10.1145/3321408
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 17 May 2019

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article

Conference

ACM TURC 2019

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)58
  • Downloads (Last 6 weeks)4
Reflects downloads up to 25 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Intelligent Insight into IoT Threats: Leveraging Advanced Analytics with Honeypots for Anomaly Detection2024 IEEE 9th International Conference for Convergence in Technology (I2CT)10.1109/I2CT61223.2024.10543511(1-6)Online publication date: 5-Apr-2024
  • (2024)Securing smart cities through machine learning: A honeypot‐driven approach to attack detection in Internet of Things ecosystemsIET Smart Cities10.1049/smc2.12084Online publication date: 29-May-2024
  • (2023)Designing and Evaluating a Flexible and Scalable HTTP Honeypot Platform: Architecture, Implementation, and ApplicationsElectronics10.3390/electronics1216348012:16(3480)Online publication date: 17-Aug-2023
  • (2021)A Survey of Honeypots and Honeynets for Internet of Things, Industrial Internet of Things, and Cyber-Physical SystemsIEEE Communications Surveys & Tutorials10.1109/COMST.2021.310666923:4(2351-2383)Online publication date: Dec-2022
  • (2021)FirmPot: A Framework for Intelligent-Interaction Honeypots Using Firmware of IoT Devices2021 Ninth International Symposium on Computing and Networking Workshops (CANDARW)10.1109/CANDARW53999.2021.00074(405-411)Online publication date: Nov-2021

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media