Try our new research platform with insights from 80,000+ expert users

Threat Intelligence ELK-based evaluation of honeypots and IOT devices

Ajinkya Mohod - PeerSpot reviewer
50 people affected
6 people managed
3 month project

Project Description

Constant need to anonymously detect suspicious and conspicuous activity in the IoT landscape, based on the data that is generated by these devices, for example, by trying to understand attack patterns and motives of the attacker through deception in cloud environment.

Value Points: 
To conduct state-of-the-art IoT attacks in IoT. 

To use honeypots to aid in attack detection in an IoT environment on Cloud environment

to develop a prototype as a proof of concept

Lessons Learned

Would start with good budget and before time with backup and planning

Highlights

Under budget
Received recognition / award
Support from colleagues

Difficulties

Steep learning curve
  • Pune (IN)18.519673.8553
  • Kanpur (IN)26.447880.3463