
7 CONCLUSIONS
It seems like both geographic blocking and rate-
limiting connections can increase the security of IoT
devices significantly, but more work is needed to ver-
ify our findings and tailor the results towards IoT de-
vices. In our tests, GeoIP lowered the probability of
getting attacked by roughly 90% and fail2ban by up
to 99%.
ACKNOWLEDGEMENTS
This work has received funding from the Swedish
Centre for Smart Grids and Energy Storage (Swe-
GRIDS).
REFERENCES
A. K. Simpson, F. Roesner, T. K. (2017). Securing vulnera-
ble home iot devices with an in-hub security manager.
In Pervasive Computing and Communications Work-
shops (PerCom Workshops), 2017 IEEE International
Conference on, pages 551–556. IEEE.
Altolini, D., Lakkundi, V., Bui, N., Tapparello, C., and
Rossi, M. (2013). Low power link layer security for
iot: Implementation and performance analysis. In
2013 9th International Wireless Communications and
Mobile Computing Conference (IWCMC), pages 919–
925.
Atzori, L., Iera, A., and Morabito, G. (2010). The internet
of things: A survey. Computer Networks, 54(15):2787
– 2805.
Dowling, S., Schukat, M., and Melvin, H. (2017). A zigbee
honeypot to assess iot cyberattack behaviour. In 2017
28th Irish Signals and Systems Conference (ISSC),
pages 1–6.
Ekstedt, M., Johnson, P., Lagerstr
¨
om, R., Gorton, D.,
Nydr
´
en, J., and Shahzad, K. (2015). Securi cad by
foreseeti: A cad tool for enterprise cyber security
management. In 2015 IEEE 19th International Enter-
prise Distributed Object Computing Workshop, pages
152–155. IEEE.
Florin B. Manolache, Q. Hou, O. R. (2014). Analysis and
prevention of network password guessing attacks in
an enterprise environment. In 2014 RoEduNet Con-
ference 13th Edition: Networking in Education and
Research Joint Event RENAM 8th Conference, pages
1–7. IEEE.
Gupta, N., Naik, V., and Sengupta, S. (2017). A fire-
wall for internet of things. In 2017 9th International
Conference on Communication Systems and Networks
(COMSNETS), pages 411–412.
Johnson, P., Lagerstr
¨
om, R., and Ekstedt, M. (2018). A
meta language for threat modeling and attack sim-
ulations. In Proceedings of the 13th International
Conference on Availability, Reliability and Security,
page 38. ACM.
Kolias, C., Kambourakis, G., Stavrou, A., and Voas, J.
(2017). Ddos in the iot: Mirai and other botnets. Com-
puter, 50(7):80–84.
Oliveri, A. and Lauria, F. (2018). Sagishi: an undercover
software agent for infiltrating iot botnets. Network Se-
curity, 1:9–14.
Pa, Y. M. P., Suzuki, S., Yoshioka, K., Matsumoto, T.,
Kasama, T., and Rossow, C. (2015). Iotpot: Analysing
the rise of iot compromises.
S. Raza, L. Wallgren, T. V. (2013). Svelte: Real-time in-
trusion detection in the internet of things. Ad hoc net-
works, 11(8):2661–2674.
Sha, L., F. Xiao, F., Chen, W., and Sun, J. (2018). Iiot-
sidefender: Detecting and defense against the sensi-
tive information leakage in industry iot. World Wide
Web, 21(1):59–88.
Shrivastava, R. K., Bazila, B., and Hota, C. (2019). Attack
detection and forensics using honeypot in iot environ-
ment. In Fahrnberger, G., Gopinathan, S., and Parida,
L., editors, Distributed Computing and Internet Tech-
nology, pages 402–409, Cham. Springer International
Publishing.
Sohal, A. S., Sandhu, R., Sood, S. K., and Chang, V. (2018).
A cybersecurity framework to identify malicious edge
device in fog computing and cloud-of-things environ-
ments. Computers Security, 74:340–354.
Sun, P., Li, J., Bhuiyan, Z. A., Wang, L., and Li, B.
(2018). Modeling and clustering attacker activities in
iot. Computer, 479:Pages 456–471.
Ungurean, I., Gaitan, N., and Gaitan, V. G. (2014). An iot
architecture for things from industrial environment. In
2014 10th International Conference on Communica-
tions (COMM), pages 1–4. IEEE.
Valli, C., Rabadia, P., and Woodward, A. (2013). A zigbee
honeypot to assess iot cyberattack behaviour. In Pat-
terns and patter - An investigation into SSH activity
using Kippo Honeypots.
Watson, D. L. (2015). Some security perils of smart living.
International Conference on Global Security, Safety,
and Sustainability, 534:Pages 211–227.
Yu, J. (2016). An empirical study of denial of service (dos)
against voip. In 2016 15th International Conference
on Ubiquitous Computing and Communications and
2016 International Symposium on Cyberspace and Se-
curity (IUCC-CSS), pages 54–60. IEEE.
Securing IoT Devices using Geographic and Continuous Login Blocking: A Honeypot Study
431