Please use this identifier to cite or link to this item: https://hdl.handle.net/20.500.11851/8621
Full metadata record
DC FieldValueLanguage
dc.contributor.authorYener, Devran-
dc.contributor.authorÖzyer, Tansel-
dc.contributor.authorKugu E.-
dc.date.accessioned2022-07-30T16:43:36Z-
dc.date.available2022-07-30T16:43:36Z-
dc.date.issued2021-
dc.identifier.citationYener, D., Özyer, T., & Kuğu, E. (2021, December). Analysis and Comparison of Honeypot Activities on Two ISP Networks. In 2021 2nd International Informatics and Software Engineering Conference (IISEC) (pp. 1-6). IEEE.en_US
dc.identifier.isbn9781665407595-
dc.identifier.urihttps://doi.org/10.1109/IISEC54230.2021.9672371-
dc.identifier.urihttps://hdl.handle.net/20.500.11851/8621-
dc.description2nd International Informatics and Software Engineering Conference, IISEC 2021 -- 16 December 2021 through 17 December 2021 -- -- 176423en_US
dc.description.abstractWhile the enormous growth of cyberspace makes life easier, it also brings new challenges to overcome. The concept of the Internet of Things (IoT) is the main actor of this metamorphosis. They are spreading very quickly due to their advantages and cost-effective nature. These systems also cause risky situations by ignoring security requirements. By their nature, honeypots help us to understand and prevent malicious activities by the attackers. Although significant research has been completed by using honeypots, many of them have not evaluated the real-world scenarios, and some of them have covered only the cloud or a single network. Comparison between Internet Service Providers (ISPs) or cloud providers has been neglected. In our work, we try to fill this gap by positioning the Kippo honeypot behind two different ISP lines with some known IoT device credentials. We have collected Kippo logs for a fifteen-day period. The study shows us that all devices can be discovered by mass scan. Therefore, both ISP networks are at the same amount of risk from cyberattacks. Although there was no significant change in the number of attacks per day during the fifteen-day test period, it is quite high compared to previous studies. This comparison highlights the fact that protecting cyber assets is getting harder every year. © 2021 IEEE.en_US
dc.language.isoenen_US
dc.publisherInstitute of Electrical and Electronics Engineers Inc.en_US
dc.relation.ispartof2nd International Informatics and Software Engineering Conference, IISEC 2021en_US
dc.rightsinfo:eu-repo/semantics/closedAccessen_US
dc.subjectCyber securityen_US
dc.subjectHoneypoten_US
dc.subjectInternet of thingsen_US
dc.subjectInternet service provideren_US
dc.subjectKippoen_US
dc.subjectCost effectivenessen_US
dc.subjectCybersecurityen_US
dc.subjectInternet of thingsen_US
dc.subjectNetwork securityen_US
dc.subjectWeb servicesen_US
dc.subjectCost effectiveen_US
dc.subjectCyber securityen_US
dc.subjectCyberspacesen_US
dc.subjectHoneypotsen_US
dc.subjectKippoen_US
dc.subjectMalicious activitiesen_US
dc.subjectReal-world scenarioen_US
dc.subjectSecurity requirementsen_US
dc.subjectService provider networksen_US
dc.subjectSingle-networksen_US
dc.subjectInternet service providersen_US
dc.titleAnalysis and Comparison of Honeypot Activities on Two Isp Networksen_US
dc.typeConference Objecten_US
dc.departmentFakülteler, Mühendislik Fakültesi, Bilgisayar Mühendisliği Bölümüen_US
dc.departmentFaculties, Faculty of Engineering, Department of Computer Engineeringen_US
dc.identifier.wosWOS:000841548300057en_US
dc.identifier.scopus2-s2.0-85125343156en_US
dc.institutionauthorÖzyer, Tansel-
dc.identifier.doi10.1109/IISEC54230.2021.9672371-
dc.authorscopusid57468049100-
dc.authorscopusid8914139000-
dc.authorscopusid57467891700-
dc.relation.publicationcategoryKonferans Öğesi - Uluslararası - Kurum Öğretim Elemanıen_US
item.openairetypeConference Object-
item.languageiso639-1en-
item.grantfulltextnone-
item.fulltextNo Fulltext-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.cerifentitytypePublications-
crisitem.author.dept02.1. Department of Artificial Intelligence Engineering-
Appears in Collections:Bilgisayar Mühendisliği Bölümü / Department of Computer Engineering
Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection
WoS İndeksli Yayınlar Koleksiyonu / WoS Indexed Publications Collection
Show simple item record



CORE Recommender

Page view(s)

94
checked on Dec 23, 2024

Google ScholarTM

Check




Altmetric


Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.