• Honeypot Deployment for IoT Security

     

    Ideally, it's best to only use high-level honeypots. Unfortunately, due to the large number of attacks, such honeypots do not scale, and each new connection requires a reconfiguration of the environment. Therefore, honeypots of the middle level of interaction are most often used; among them, the most popular open source projects are Cowrie and Dionaea.

     

    We work with honeypots of all three types; in addition, we have created a separate type of honeypot - sensory, which we will discuss in more detail below.

     

    When dealing with honeypots, you should always keep security in mind: a vulnerable or attacked system can put you and others at risk.

     

    When deploying traps, an important step is network planning and a clear definition of what activity needs to be monitored and how data will be collected and processed. Over the years, we have built a honeypot infrastructure that is constantly being expanded and optimized. We have developed our own modular approach for efficient system management, updates and data processing. The main idea is to be able to easily deploy multiple honeypots while minimizing maintenance costs.


    Tags Tags : , , ,
  • Commentaires

    Aucun commentaire pour le moment

    Suivre le flux RSS des commentaires


    Ajouter un commentaire

    Nom / Pseudo :

    E-mail (facultatif) :

    Site Web (facultatif) :

    Commentaire :