acm-header
Sign In

Communications of the ACM

ACM TechNews

Honeypot Experiment Reveals What Hackers Want From IoT Devices


View as: Print Mobile App Share:
Bees in and around a honeycomb.

The three-year-long honeypot experiment produced data from 22.6 million hits.

Credit: BleepingComputer

A honeypot experiment performed by researchers at the U.S. National Institute of Standards and Technology and the University of Florida has clarified hackers' goals in targeting Internet of Things (IoT) devices.

The researchers assembled the honeypot ecosystem from server farms, a vetting system, and a data capture/analysis infrastructure, using IoT honeypot emulators configured as actual devices on the Censys and Shodan search engines.

The ecosystem collated 22.6 million hits, and hackers employed similar techniques, like scanning for open ports, firewall disablement, and collecting data on target devices.

Recommended countermeasures include long account names, separating IoT device networks from critical assets, regular firmware and security updates, active device monitoring, and firewall/virtual private network protection.

From BleepingComputer
View Full Article

 

Abstracts Copyright © 2022 SmithBucklin, Washington, DC, USA


 

No entries found

Sign In for Full Access
» Forgot Password? » Create an ACM Web Account