We propose and demonstrate an IoT Honeypot framework based on the open source automatedmalware analysis system Cuckoo Sandbox [3] that’s capable of emulating such IoT devices. By attaching the emulated IoT instance(s) to the internet, either in internal networks or using public IP addresses, an attacker may decide to target their campaign at the emulated IoT devices, allowing our IoT Honeypot to detect & analyze the payloads and attack methods. The IoTHoney framework allows organizations to run IoT-focused honeypots tailored to their organization.

Presentation

Presentation Pieter Jansen Jurriaan Bremer

Details

time: 12:20
speakers: Pieter Jansen, Jurriaan Bremer

Other sessions:

Let’s Update the Way we Do Updates


The Dutch Response to a Cyber Incident


Five Years of DANE - Modern, Secure and Stress-free SMTP


Constraints for Code: an Economic Analysis of Policies for Secure Digital Products


Digital disease: clinical simulations of hacked devices