Continent-Based Comparative Study of Internet Attacks

نویسندگان

  • Idris A. Rai
  • Matsiko Perez
چکیده

We have deployed a honeypot sensor node in Uganda that is connected to a distributed honeypot system managed by Leurrecom.org Honeypot project, which constitutes of a large number of different honeypot sensors distributed across different continents. Once joined the project, the system allows access to the whole dataset collected by all sensors in the distributed system. We use the data collected by the honeypot sensors for a period of six months to compare the attacks that have been detected by honeypot sensors in Africa to the attacks detected by sensors in other continents. Our findings reveals that sensor nodes in Africa experience a significant number of attacks. In some cases, the number of attacks for African sensor nodes is significantly higher than many sensors in developed countries. This shows that network attacks are independent of location and Internet popularity in a country. That is, low Internet penetration level in African countries does not mean that networks in Africa are safe from external attacks. In fact, the results further indicate that some attacks are highly likely guided against specific

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Novel Trust Management Model in the Social Internet of Things

The Internet of Things (IoT) and social networking integration, create a new concept named Social Internet of Things (SIoT) according to which the things are able to autonomously establish social relationships with regard to the owners. Things in SIoT operate according to a service-oriented architecture. There may be misbehaving owners and consequently misbehaving devices that can perform harmf...

متن کامل

HMAC-Based Authentication Protocol: Attacks and Improvements

As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...

متن کامل

Comparative Analysis of SYN Flooding Attacks on TCP Connections

SYN flooding attacks are very common types of attacks in IP (Internet Protocol) based networks. It is a type of Denial of Service Attack in which attacker sends many SYN request with spoofed source address to a victim’s machine. Each request causes the targeted host to allocate data structures out of a limited pool of resources. After some time the targeted host goes out of resources and cannot...

متن کامل

Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags

The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...

متن کامل

A Survey of Anomaly Detection Approaches in Internet of Things

Internet of Things is an ever-growing network of heterogeneous and constraint nodes which are connected to each other and the Internet. Security plays an important role in such networks. Experience has proved that encryption and authentication are not enough for the security of networks and an Intrusion Detection System is required to detect and to prevent attacks from malicious nodes. In this ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010