Smart Irrigation Management System for Water Channels Using IoT
Muhammad Ibrar, Institute of Computer Sciences and Information Technology (ICS/IT), The University of Agriculture Peshawar, Pakistan.
Javed Iqbal Bangash, Institute of Computer Sciences and Information Technology (ICS/IT), The University of Agriculture Peshawar, Pakistan.
Muhammad Tariq, Institute of Computer Sciences and Information Technology (ICS/IT), The University of Agriculture Peshawar, Pakistan.
Iqtidar Ali, Institute of Computer Sciences and Information Technology (ICS/IT), The University of Agriculture Peshawar, Pakistan.
Sana Zahir, Institute of Computer Sciences and Information Technology (ICS/IT), The University of Agriculture Peshawar, Pakistan.
Nida Gul, Institute of Computer Sciences and Information Technology (ICS/IT), The University of Agriculture Peshawar, Pakistan.
Corresponding Author:
Waseem Ullah Khan (waseem@uetpeshawar.edu.pk)
Abstract:
The internet is becoming increasingly pervasive in the daily lives of individuals across the world, serving many purposes such as email communication, online exploration, and financial transactions. However, as technology advances, cyber criminals also become more sophisticated in their attacks, posing a growing risk to individuals and organizations alike. According to a report by Cybersecurity Ventures, cybercrime damages are expected to reach $10.5 trillion annually by 2025. To overcome these threats, ensuring security and privacy is crucial to safeguarding our data and networks against various types of anomalies and attacks. This paper aims to explore honeypots as a proactive measure against cyber threats. Honeypots mimic vulnerable systems to lure hackers into attempting to breach the system, enabling researchers to gather valuable data to enhance cyber defense mechanisms. This unique tool has emerged as an effective solution in information security, allowing for various applications such as detection, prevention, and data gathering. Furthermore, honeypots are non-intrusive and cost-effective, making them an attractive option for organizations seeking to enhance their security posture and protect sensitive data from cyber-attacks.
Keywords:
Honeypot; Honey Net; Network Security; Cyber Security