A Honeypot Implementation to Strengthen the security in IOT using AES and Key Management
Abstract
Honeypot technology is a trap technology in network defence. It studies and learns the adversary’s attacks by attracting and deceiving attackers and recording their attack behaviours. Target and attack methods to protect real service resources. However, traditional honeypot technology has inherent shortcomings such as static configuration and fixed deployment, and it is very easy to be attacked. Attacker identification bypasses and loses decoy value. Therefore, how to improve the dynamic and deceptive nature of honeypots has become a key issue in the field of honeypots. This paper is the research results in the field of honeypots at home and abroad are sorted out. First, the development history of honeypots is summarized. Then, the key technology of honeypots is the core, and the implementation process, department. It analyzes the method of signature, anti-identification thinking, and the theoretical basis of game; finally, it classifies and narrates the defence results of different honeypots in recent years, and develops the honeypot technology. Development trends are analyzed and stated, aiming at potential security threats, and looking forward to defence applications in emerging areas. In this paper, novel AES algorithm has been developed. In addition key management feature is added which provides more secure for registered users.