TY - JOUR KW - cyber attack prevention KW - honeypot KW - Internet of Things AU - Alexander Kolev AU - Pavlina Nikolova AB -
In the paper, the authors discuss some computer security mechanisms and their hardware realization. An overview of well-known cyber-security software solutions has been made. Data on the hardware platforms on which they are intended to be used are given. The authors explore the possibility systems terminologically known as honeypot to be hardware-based on cheap microdevices. The technological and information possibilities for the development of a honeypot network using a modern micro-controller based device are analyzed. The authors focus on the key features of selected devices and describing in detail the conditions by the experiment. Important results for the overall result of the experiment are presented in graphical and tabular form. Conclusions are made about the applicability of micro-controller devices for cyber-security purposes with the application of wireless connectivity and the provision of data about malicious actions over the Internet of Things systems.
BT - Information & Security: An International Journal DA - 2020 DO - https://doi.org/10.11610/isij.4720 IS - 3 N2 -In the paper, the authors discuss some computer security mechanisms and their hardware realization. An overview of well-known cyber-security software solutions has been made. Data on the hardware platforms on which they are intended to be used are given. The authors explore the possibility systems terminologically known as honeypot to be hardware-based on cheap microdevices. The technological and information possibilities for the development of a honeypot network using a modern micro-controller based device are analyzed. The authors focus on the key features of selected devices and describing in detail the conditions by the experiment. Important results for the overall result of the experiment are presented in graphical and tabular form. Conclusions are made about the applicability of micro-controller devices for cyber-security purposes with the application of wireless connectivity and the provision of data about malicious actions over the Internet of Things systems.
PY - 2020 SE - 285 SP - 285 EP - 299 T2 - Information & Security: An International Journal TI - Instrumental Equipment for Cyberattack Prevention VL - 47 ER -