CASPIAN JOURNAL

MANAGEMENT AND HIGH TECHNOLOGIES

RESEARCH ON THE USE OF DECEPTION TECHNOLOGY TO PREVENT CYBERSECURITY THREATS

Read Putyato Mikhail M., Makaryan Aleksandr S., Chich Shamil M., Markova Valentina K. RESEARCH ON THE USE OF DECEPTION TECHNOLOGY TO PREVENT CYBERSECURITY THREATS // Caspian journal : management and high technologies. — 2020. — №4. — pp. 85-98.

Putyato Mikhail M. - Kuban State Technological University, putyato.m@gmail.com

Makaryan Aleksandr S. - Kuban State Technological University, msanya@yandex.ru

Chich Shamil M. - Kuban State Technological University, shama_chich@icloud.com

Markova Valentina K. - Kuban State Technological University, markokovt@yandex.ru

Internet of things (IoT) devices have become increasingly popular in recent years. IoT refers to smart refrigerators, smart locks, video nannies, and other household devices that have access to the Internet. However, the growing popularity of IoT technology is increasingly attracting the attention of hackers who are interested both in disclosing confidential enduser data and in misuse of the computing resources of the attacked devices. Unfortunately, malicious attacks often result in successful compromise of devices, with the ensuing consequences. The reasons for the high level of compromise of IoT devices are caused both by errors in the design, implementation, and relatively simple operation with the use of various information security audit tools. To identify defects in the development and implementation of devices, you need to have some idea about them, that is, to identify and eliminate them in a timely manner. This can be achieved in various ways. One of these methods is to create special traps that collect information about the activity of an attacker, called honeypot. The essence of the honeypot technology is to emulate or implement the functionality of existing devices, services, and protocols, with the accumulation of data about malicious activity of an attacker. The information obtained can be used to improve the protection of real devices, services, and protocols, as well as to develop measures to counter hackers. The article provides a comparative analysis of the existing most popular honeypot systems in order to identify the best system. The analysis identified both the weaknesses and strengths of these systems. Next, an attempt is made to adapt these same systems to function at the level of Internet of things devices.

Key words: cybersecurity, deception technology, honeypot, malicious ware, forensics malware, hacker activity, information security, cyber trap, honeynet, information security