Use of Honeypots For Mitigating DoS Attacks Targeted On IoT Networks
Use of Honeypots For Mitigating DoS Attacks Targeted On IoT Networks
Abstract—Every day, a new technology comes up and devices of the system need not be in close proximity with each
the primary reason why it fails to attract many people in this era other. The tremendous growth of the internet has enabled
is the concern of privacy and security. Each day, along with the IoT’s rapid growth and today IoT systems find applications in
new technology comes a load of vulnerabilities waiting to be a variety of fields such as home automation systems, military
exploited. IoT (Internet of Things) is the latest trend and like all
technology, it is open for exploitation. The most common attack
surveillance systems, sustainable agriculture, healthcare,
which is used to bring down a whole network, without even manufacturing, smart cities and so on. With all the
finding a loophole in the security – DoS can be used to pull down advancements that have been made in the field of IoT over the
any IoT network as well. In this paper, we propose a honeypot past years’ security issues have been a major concern that has
model for mitigating DoS attacks launched on IoT devices. hampered the usage of IoT systems in certain critical fields
Honeypots are commonly used in online servers as a decoy to the such as warfare, military surveillance, etc. Since they are built
main server so that the attack is mitigated to the decoy instead of on top of the internet, IoT systems are extremely vulnerable to
the main server. Here a similar methodology is used to avoid the malicious attacks. One of the several possible attacks on IoT
whole IoT system from being shut down due to a DoS attack. systems, Denial of Service (DoS) attack, is being dealt with in
Keywords—Internet of Things, Denial of Service, Honeypot,
this paper. DoS attacks have been a nightmare for
IoT Security, Security breach. communication networks in general over the years and they
pose a major security threat to IoT systems as well. Citing an
I. INTRODUCTION example here, one major use of IoT is home automation
Denial-of-Service (DoS) attack is a type of attack which is systems. If an attacker attacks the main server of such a
used to temporarily or indefinitely shut down the system with a DoS attack, the whole system tends to shut
system/network thus disallowing the intended users to access down and any appliance within the whole house, sometimes
it. It is achieved by pinging the system with a load of spam even door locks are rendered inaccessible. This small example
requests which the system won’t be able to handle i.e. the shows the significance of security implementation in IoT. In
system’s processing power will be limited, and loading it with this paper we present a solution to the problem of DoS attacks
a lot of spam requests will tend to overload and crash it. It is on IoT systems by using honeypots to divert the attacks as
achieved through various methods, the most famous of them well as capture information about the attacker.
being botnets and buffer overflow vulnerability. The most
common victims of DoS attacks are high profile organizations Honeypot is a system which is used to mimic the
such as banking and government organizations which tend to main system by luring potential hackers who seek to gain
have significant and highly confidential information. The DoS unauthorized access to information systems. It is used to study
attacks cost them a great deal of time and money apart from activities, traces left by hackers and to rectify the systems
loss of data. Though there are many methods or software fixes securities in order to prevent future attacks. Generally, it
to avert such attacks, new DoS attacks are being constantly consists of a computer, applications and data that simulate the
introduced due to ever-growing advancements in the field of behavior and acts as a decoy. It is usually a part of firewall so
hacking. that they can be controlled easily. Based on the design and
deployment, honeypots are classified as either production or
Internet of Things (IoT) is a recently evolved research honeypots. Research honeypots are run to have a
technology that has taken the world by a storm. Basically, an detailed study about the intruder and safety security measures
IoT system consists of several interrelated computing devices, while production honeypots are placed in production network
sensors, RFID tags, etc. that are connected to a main server to serve the role of a decoy as part of intrusion detection
through the internet enabling transfer of data and information system (IDS). While Ed Tittel et al [8] describes innumerable
without human intervention. Since it is built on the internet the security measures for preventing and handling attacks using
honeypot in various web servers, using honeypot to prevent
DoS attacks in IoT is still a ‘yet-to-be researched’ topic. In tremendous growth of the internet has also led to the
this paper, we present a solution how honeypot pillared with a development of IoT (Internet of Things) which is a network of
verification system is used to secure an IoT system. interconnected wireless devices such as mobile phones, RFID,
sensors and so on. The great advantage of IoT is that the
devices interconnected need not be homogenous. The
II. RELATED WORKS communication protocols between each device need not be the
Honeypots have been researched extensively in the same. This could enable IoT to have far reaching effects in
past. Several models using honeypots have been proposed for various fields such as home automation systems, military
security against various attacks. Sherif M. Khattab et al [1] surveillance systems, sustainable agriculture, healthcare,
studies the usage of roaming honeypots to mitigate distributed manufacturing and so on. IoT can and is making the dream of
DoS attacks. A random set of servers’ is used as honeypots at smart cities and driverless cars a reality.
any given time making it difficult for hackers to find and shut
down the honeypots thus enhancing the performance of the In IoT based networks new devices that enter the
system against attacks. Theodor Richardson et al [2] describes network are configured automatically due to its open nature.
a technique of using masquerading honeypots to protect back- This leaves such networks prone to a lot of attacks as
end servers from attacks. Sherif Khattab et al [3] extends the described by Weizhe Zhang et al [6]. Moreover, since the
work done in [1] to propose a scheme of honeypot back- communication protocols between devices vary, protocols
propagation to backtrack and find the source of the DoS attack with weaknesses could be exploited by attackers. Such
thus further increasing defence mechanisms against DoS attackers could get hold of sensitive data carried over these
attacks. All the above mentioned works the focus is not on protocols. Since most of the IoT based systems are deployed
mitigating DoS attacks on IoT networks. in important and critical processes data privacy is extremely
With regard to DoS attacks on IoT we would like to important. Sensitive data passed between devices in the
highlight the research undertaken and the ideas proposed to network should not fall into the wrong hands. Attacks on IoT
deal with this disastrous attack. Sudip Misra et al [4] proposes based networks are divided into three categories which are
learning automata based approach to deal with DoS attacks in attacks against the front-end devices such as the sensors in the
IoT systems. A Learning Automata(LA) based approach is network, attacks against the communication channels between
used to build a DDoS prevention strategy in IoT systems built the devices and the servers and lastly attacks against the
on Service Oriented Architecture (SOA). There has also been servers.
research previously undertaken into the usage of honeypots to
mitigate DoS attacks in IoT systems. However, at the present As discussed earlier a denial of service attack is one
juncture this research remains theoretic with only theoretic by which the attacker floods the network with numerous spam
models being proposed. The practical implementation of requests exceeding the handling capacity of the server thus
honeypots in IoT systems for the purpose of DoS attack preventing requests from legitimate clients in the network
prevention is an avenue that remains unexplored. C. Scott et al from getting processed. DoS attacks can be launched through
[10] demonstrates a layered approach for securing Supervisory various methods/exploits all targeted at denying service to
Control and Data Acquisition (SCADA) network using legitimate clients by either overloading the connection
honeypots. Quang Duy La et al [5] proposes game theoretic handling or processing capability of the server. The open
model in which both the attacker and defender try to deceive nature of IoT makes it relatively easy for spammers and
each other. The defender uses honeypots to deceive and trap attackers to infiltrate IoT networks and launch DoS attacks. C.
the attackers. This research is an extension of the work done Kwon et al [9] shows that such attacks could ultimately cause
by N. Garg et al [7] that analyses the effectiveness of using the server to crash and hence paralyze the network. This could
honeypots for deception in networks following a game- have far reaching consequences depending on the purpose of
theoretic approach. As mentioned previously these works have the network.
been confined to theoretic models. With this in mind, we
deploy a honeypot based security system for an IoT system in Generally, these kinds of attacks are concentrated
this paper, to block DoS attacks from malicious attackers and towards the main server rather than the individual devices
also collect information on the attacker so that future attacks connected in the system. The main reason is that it is easier to
might be prevented. access the main server rather than the individual devices
because the protocol for data transmission in each device
might be configured differently and also another main reason
III. DOS ATTACKS IN IOT SYSTEM is that, by crashing the main server, the whole system is
The last couple of decades have witnessed the growth supposedly shut down since another potential user can’t access
of the internet into a global communication platform that has the main server to link to any other device.
changed our perspective on how we communicate and do
business with people around the world. As of Dec 2015 nearly
3.4 billion people worldwide (nearly 46% of the world’s
population) have access to internet connection. This
IV. PROPOSED MODEL central server and various nodes linked to it. The clients send
In the proposed model, the system works in two in data at varied time periods. The data is just simulated data
states as depicted in the below diagrams. of constant size so that calculation of efficiency is made
simpler. The server collects it and uses it for processing. It acts
A. Primary Scenario as a representation of an IOT model which collects various
Fig. 1 depicts that all requests from clients are passed information like temperature, humidity, pressure, etc. The
to the IDS (Intrusion Detection System). Legitimate requests simulation has a variation of number of nodes (bots) from 0 to
from clients pass through the IDS onto the server. If the IDS 100 in steps of 10. The simulation for the proposed model is
detects any anomalies in the requests (Example: Spam built and the efficiency is tested here i.e. ratio of data
requests to initiate a DoS attack), the requests are passed onto transmitted from client in total to the data received in the
the honeypot and the information related to the attacker (IP server. It is tested in both scenarios with the implementation of
Address, MAC Address, etc.) are stored as logs in a database. the proposed model and without the implementation of the
proposed model, with the statistics recorded in Table. 1. This
statistical information has also been plotted in the form of a
graph and shown in Fig. 3.
TABLE 1
ANALYSIS OF IOT SYSTEM WITH/WITHOUT HONEYPOT
Fig. 2 Secondary Scenario Fig 3. gives us the complete analysis of the behavior
of the IoT system with and without the honeypot. Based on the
V. SIMULATION RESULTS simulation, the efficiency is calculated at both scenarios and
plotted in form of a graph with the x-axis containing number
The simulation is built in python using a socket of bots and y-axis containing efficiency and plotted in a scale
server client model. It replicates an IOT model by having a of 10 units in both axes. This figure clearly shows that there is
an increase of 55 to 60% in efficiency when a honeypot is on Software Engineering, Artificial Intelligence, Networking, and
Parallel/Distributed Computing, Jun. 2006, pp. 381–388.
implemented.
[3] Sherif Khattab, Rami Melhem, Daniel Moss´e, and Taieb Znati
VI. CONCLUSION “Honeypot Back-propagation for Mitigating Spoofing Distributed
Denial-of-Service Attacks” in 20th IEEE International Parallel &
Denial-of-Service (DoS) attacks have been a major Distributed Processing Symposium, Apr. 2006, pp. 8-8.
threat to various networks and systems for years. This paper [4] Sudip Misra, P. Venkata Krishna, Harshit Agarwal, Antriksh Saxena and
provides a detailed study of how DoS attack in an IoT system Mohammad S. Obaidat “A Learning Automata Based Solution for
Preventing Distributed Denial of Service in Internet of Things” in 4th
is averted by honeypot system pillared with a verification IEEE International Conference on Cyber, Physical and Social
system to maintain the efficiency (data received/data Computings, Oct. 2011, pp. 114-122.
transmitted). And the simulation results account for the [5] Quang Duy La, Tony Q. S. Quek, Jemin Lee, Shi Jin, and Hongbo Zhu
efficiency of the proposed model. “Deceptive Attack and Defense Game in Honeypot-enabled Networks
for the Internet of Things” in IEEE Internet of Things Journal, vol. 3, no.
Therefore, outcomes of this work demonstrate the capability 9, Feb. 2016, pp. 1-1.
of our proposed scheme for implementing honeypot to secure [6] Quang Duy La, Tony Q. S. Quek, Jemin Lee, Shi Jin, and Hongbo Zhu
an IoT system. “Deceptive Attack and Defense Game in Honeypot-enabled Networks
for the Internet of Things” in IEEE Internet of Things Journal, vol. 3, no.
Future works would be to collect and analyze results 9, Feb. 2016, pp. 1-1.
for the proposed model implemented in a real-time [7] Quang Duy La, Tony Q. S. Quek, Jemin Lee, Shi Jin, and Hongbo Zhu
environment with various microcontrollers interfaced with a “Deceptive Attack and Defense Game in Honeypot-enabled Networks
for the Internet of Things” in IEEE Internet of Things Journal, vol. 3, no.
central server. This idea of deploying honeypots to handle 9, Feb. 2016, pp. 1-1.
DoS attacks could also be extended, by deploying a honeypot [8] W. Zhang and B. Qu, “Security architecture of the Internet of Things
system which is capable of handling DDoS attacks using oriented to perceptual layer” in Int. J. Comput. Consum. Control, vol. 2,
botnets, since the verification system for this model might no. 2, Jun. 2013, pp. 37–45.
prove incapable there. Moreover, the use of honeypot could be [9] N. Garg and D. Grosu, “Deception in honeynets: A game-theoretic
extended for other types of attacks as a research based analysis” in Proc. IEEE Workshop on Information Assurance, Jun. 2007,
pp. 107–113.
honeypot to collect details.
[10] “The Honeynet Project, Know Your Enemy: Learning about Security
Threats”, 2nd ed. Addison-Wesley Professional, May 2004.
[11] C. Kwon, W. Li, and I. Hwang, “Security analysis for cyber-physical
REFERENCES systems against stealthy deception attacks” in Proc. American Control
[1] Sherif M. Khattab, Chatree Sangpachatanaruk, Daniel Moss´e, Rami Conference, Jun. 2013, pp. 3350–3355.
Melhem and Taieb Znati “Roaming Honeypots for Mitigating Service [10] C. Scott, “Designing and implementing a honeypot for a SCADA
level Denial-of-Service Attacks” in 24th International Conference on network” in SANS Institute Reading Room
Distributed Computing Systems, Mar. 2004, pp. 328–337. May.2014[Online].Available:http://www.sans.org/readingroom/whitepa
[2] Theodor Richardson “Preventing Attacks on Back-End Servers using pers/detection/designing-implementing-honeypot-scadanetwork-35252.
Masquerading/Honeypots” in Seventh ACIS International Conference