Attack Patterns on IoT devices using Honey Net Cloud
A R Jayakrishnan1, V.Vasanthi2

1A. R Jayakrishnan*, Research Scholar, RCAS, Bharathiar University, Coimbatore, Tamil Nadu. India.
V.Vasanthi, Assistant Professor, Dept of IT, SKASC, Coimbatore, Tamil Nadu, India.

Manuscript received on November 16, 2019. | Revised Manuscript received on 24 November, 2019. | Manuscript published on December 10, 2019. | PP: 3281-3288 | Volume-9 Issue-2, December 2019. | Retrieval Number: B6591129219/2019©BEIESP | DOI: 10.35940/ijitee.B6591.129219
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (

Abstract: Due to the superfluous growth of IoT devices in the current digital world, where lots of devices are becoming smart by being able to connect internet with many smart features, IoT devices have become the main target of cyber-attacks for the hackers these days. Since the IoT devices are very light in terms of processing power and memory, it has become an easy target for hackers to intrude in to the network easily. The file-less attacks, that usually doesn’t require any files to be downloaded and installed gets bypassed by anti-malwares. Very less effort has been put to learn the characteristics of attack patterns in IoT devices to do the research and development efforts to defend against them. This paper deep dives to understand the attacks on IoT devices in the network. Honey Net Cloud has been made with four hardware honeypots and hundred software honeypots setup that are meant to attract wide variety of attacks from the real world. Huge range of data was recorded for the span of 12 months. This study leads to multifold insights towards developing the IoT Network Forensics Methodology. 
Keywords: IoT Attack, Network Forensics, Honeypots, Digital Security, Honey Net Cloud, Intrusion
Scope of the Article: IoT