Attack Patterns on IoT devices using Honey Net Cloud

  • Jayakrishnan* A
  • et al.
Citations of this article
Mendeley users who have this article in their library.
Get full text


Due to the superfluous growth of IoT devices in the current digital world, where lots of devices are becoming smart by being able to connect internet with many smart features, IoT devices have become the main target of cyber-attacks for the hackers these days. Since the IoT devices are very light in terms of processing power and memory, it has become an easy target for hackers to intrude in to the network easily. The file-less attacks, that usually doesn’t require any files to be downloaded and installed gets bypassed by anti-malwares. Very less effort has been put to learn the characteristics of attack patterns in IoT devices to do the research and development efforts to defend against them. This paper deep dives to understand the attacks on IoT devices in the network. HoneyNetCloud has been made with four hardware honeypots and hundred software honeypots setup that are meant to attract wide variety of attacks from the real world. Huge range of data was recorded for the span of 12 months. This study leads to multifold insights towards developing the IoT Network Forensics Methodology.




Jayakrishnan*, A. R., & Vasanthi, V. (2019). Attack Patterns on IoT devices using Honey Net Cloud. International Journal of Innovative Technology and Exploring Engineering, 9(2), 3281–3288.

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free