Please use this identifier to cite or link to this item: http://dspace.uniten.edu.my/jspui/handle/123456789/13169
DC FieldValueLanguage
dc.contributor.authorRazali, M.F.en_US
dc.contributor.authorMuruti, G.en_US
dc.contributor.authorRazali, M.N.en_US
dc.contributor.authorJamil, N.en_US
dc.contributor.authorMansor, F.Z.en_US
dc.date.accessioned2020-02-03T03:30:52Z-
dc.date.available2020-02-03T03:30:52Z-
dc.date.issued2019-
dc.description.abstractHoneypot is a tool with an isolated and separated network that mimic a real valuable network that would be of value for attackers. It can be seen as a fake system that looks like a real one with an aim to attract attackers to fall into it and thus monitor the interaction between attackers and the infected device. As the time flow, honeypot has become one of an important subject to researchers in information security for attack recognition and deception toolkit. The present considers implementing honeypot on IoT since IoT device demands target of attackers, plus it is one of the popular platforms in this century. With the fast progression of computer and Internet, a honeypot can provide us with the information of malware attack or even the attack patterns. In this paper, a survey of honeypot in IoT is presented. © 2018 IEEE
dc.language.isoenen_US
dc.titleIoT honeypot: A review from researcher's perspectiveen_US
dc.typeConference Paperen_US
dc.identifier.doi10.1109/IISA.2018.8631494-
item.fulltextNo Fulltext-
item.grantfulltextnone-
Appears in Collections:UNITEN Scholarly Publication
Show simple item record

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.