[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ Skip to main content
Log in

Applying Honeypot Technology with Adaptive Behavior to Internet-of-Things Networks

  • Published:
Automatic Control and Computer Sciences Aims and scope Submit manuscript

Abstract—

The application of the honeypot technology with adaptive behavior to monitor and analyze attacks on Internet-of-Things networks is considered. Existing adaptive systems are analyzed, and the optimal one for building a honeypot is determined. It is proposed to use the Markov decision-making process as the mathematical apparatus for the adaptive honeypot system. The resulting honeypot can be used to track attacks on XMPP and SSH protocols.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (United Kingdom)

Instant access to the full article PDF.

Fig. 1.
Fig. 2.
Fig. 3.
Fig. 4.
Fig. 5.

Similar content being viewed by others

REFERENCES

  1. Antonakakis, M., April, T., Bailey, M., Bernhard, M., Bursztein, E., Cochran, J., Durumeric, Z., Halderman, J.A., Invernizzi, L., Kallitsis, M., Kumar, D., Lever, C., Ma, Z., Mason, J., Menscher, D., Seaman, C., Sullivan, N., Thomas, K., and Zhou, Y., Understanding the Mirai botnet, 26th USENIX Security Symp., Vancouver, 2017, Vancouver: USENIX Assoc., 2017, pp. 1093–1110.

  2. Krundyshev, V. and Kalinin, M., Generative adversarial network for detecting cyber threats in industrial systems, Proceeding of International Scientific Conference on Telecommunications, Computing and Control, Voinov, N., Schreck, T., and Khan, S., Eds., Smart Innovation, Systems and Technologies, vol. 220, Singapore: Springer, 2021, pp. 1–13.  https://doi.org/10.1007/978-981-33-6632-9_1

  3. Moskvin, D.A. and Ivanov, D.V., Methods of protecting self-organizing networks against attacks on traffic routing, Autom. Control Comput. Sci., 2015, vol. 49, no. 8, pp. 745–750.  https://doi.org/10.3103/S0146411615080118

    Article  Google Scholar 

  4. Ivanov, D.V. and Moskvin, D.A., Application of fractal methods to ensure the cyber-resilience of self-organizing networks, Nonlinear Phenom. Complex Syst. (Minsk, Belarus), 2019, vol. 22, no. 4, pp. 336–341.  https://doi.org/10.33581/1561-4085-2019-22-4-336-341

    Article  Google Scholar 

  5. Cho, H., Lim, S., Kalinin, M., Krundyshev, V., Belenko, V., and Chernenko, V., Genetic sequence alignment computing for ensuring cyber security of the IoT systems, Sustainable Intelligent Systems, Joshi, A., Nagar, A.K., Marín-Raventós, G., Eds., Advances in Sustainability Science and Technology, Singapore: Springer, 2021, pp. 235–252.  https://doi.org/10.1007/978-981-33-4901-8_14

  6. Ognev, R.A., Zhukovskii, E.V., and Zegzhda, D.P., Clustering of malicious executable files based on the sequence analysis of system calls, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 1045–1055.  https://doi.org/10.3103/S0146411619080212

    Article  Google Scholar 

  7. Zhukovskiy, E.V. and Zegzhda, D.P., Analysis of malware with dangerous trigger-based behavior, Zashchita Inf. Insaid, 2019, no. 3, pp. 60–63.

  8. Belenko, V., Krundyshev, V., and Kalinin, M., Intrusion detection for internet of things applying metagenome fast analysis, Third World Conf. on Smart Trends in Systems Security and Sustainability (WorldS4), London, 2019, IEEE, 2019, pp. 129–135.  https://doi.org/10.1109/WorldS4.2019.8904022

  9. Kalinin, M. and Krundyshev, V., Sequence alignment algorithms for intrusion detection in the Internet of Things, Nonlinear Phenom. Complex Syst. (Minsk, Belarus), 2020, vol. 23, no. 4, pp. 397–404. https://doi.org/10.33581/1561-4085-2020-23-4-397-404

    Article  Google Scholar 

  10. Belenko, V., Krundyshev, V., and Kalinin, M., Synthetic datasets generation for intrusion detection in VANET, Proc. 11th Int. Conf. on Security of Information and Networks, Cardiff, 2018, New York: Association for Computing Machinery, 2018, p. 9.  https://doi.org/10.1145/3264437.3264479

  11. Konoplev, A.S., Busygin, A.G., and Zegzhda, D.P., A blockchain decentralized public key infrastructure model, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1017–1021.  https://doi.org/10.3103/S0146411618080175

    Article  Google Scholar 

  12. Busygin, A.G., Konoplev, A.S., and Zegzhda, D.P., Providing stable operation of self-organizing cyber-physical system via adaptive topology management methods using blockchain-like directed acyclic graph, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1080–1083.  https://doi.org/10.3103/S0146411618080059

    Article  Google Scholar 

  13. Busygin, A.G. and Kalinin, M.O., Approach to protection of blockchain systems against threats caused by uneven distribution of computational power, 17th St. Petersburg, Int. Conf. Regional Informatics (RI-2020), St. Petersburg, 2020, St. Petersburg: SPOISU, 2020, pp. 121–122.

  14. Aleksandrova, E.B., Methods of group authentication for low-resource vehicle and flying self-organizing networks, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 947–958.  https://doi.org/10.3103/S014641161708003X

    Article  Google Scholar 

  15. Aleksandrova, E.B., Zegzhda, D.P., and Konoplev, A.S., Applying the group signature for entity authentication in distributed grid computing networks, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 739–742.  https://doi.org/10.3103/S0146411616080265

    Article  Google Scholar 

  16. Aleksandrova, E.B., Rekhviashvili, I. Sh., and Yarmak, A.V., Lattice-based ring signature with linking-based revocation for industrial Internet of Things, Autom. Control Comput. Sci., 2020, vol. 54, no. 8, pp. 888–895.  https://doi.org/10.3103/S0146411620080039

    Article  Google Scholar 

  17. Ovasapyan, T. and Moskvin, D., Security provision in WSN on the basis of the adaptive behavior of nodes, Fourth World Conf. on Smart Trends in Systems, Security and Sustainability (WorldS4), London, 2020, IEEE, 2020, pp. 81–85.  https://doi.org/10.1109/WorldS450073.2020.9210421

  18. Anthi, E., Williams, L., and Burnap, P., Pulse: an adaptive intrusion detection for the internet of things, Living in the Internet of Things: Cybersecurity of the IoT, London, 2018, London: IET Digital Library, 2018.  https://doi.org/10.1049/cp.2018.0035

    Book  Google Scholar 

  19. Sabatucci, L., Seidita, V., and Cossentino, M., The four types of self-adaptive systems: A metamodel, Intelligent Interactive Multimedia Systems and Services 2017. KES-IIMSS-18 2018, De Pietro, G., Gallo, L, Howlett, R., and Jain, L., Eds., Smart Innovation, Systems and Technologies, vol. 76, Cham: Springer, 2018, pp. 440–450.  https://doi.org/10.1007/978-3-319-59480-4_44

  20. Saint-Andre, P., Smith, K., and Tronon, R., XMPP: The Definitive Guide, O’Reilly Media, 2009.

    Google Scholar 

  21. Ylönen, T., SSH-secure login connections over the Internet, Proc. 6th Conf. on USENIX Security Symp., Focusing on Applications of Cryptography, San Jose, Calif., 1996, Berkeley, Calif.: USENIX Association, 1996, vol. 6, p. 4.

Download references

Funding

This work was supported by the Russian Foundation for Basic Research, project no. 18-29-03102.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to T. D. Ovasapyan or D. A. Moskvin.

Ethics declarations

The authors declare that they have no conflicts of interest.

Additional information

Translated by O. Pismenov

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ovasapyan, T.D., Nikulkin, V.A. & Moskvin, D.A. Applying Honeypot Technology with Adaptive Behavior to Internet-of-Things Networks. Aut. Control Comp. Sci. 55, 1104–1110 (2021). https://doi.org/10.3103/S0146411621080253

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S0146411621080253

Keywords:

Navigation