logo
 
 
 
fb-icon   twi-icon   youtube   in-icon
 
 
  Product Information
  Datasheet  
  Demo Software Request  
  Overview  
  Benefits  
  Operation  
  System Requirements  
     
 
  Contact SimpleSoft Sales
  Please send an email to sales@simplesoft.com to request information for pricing, licensing and other questions about our solutions.  
 
  Testimonials
  "We found the SimpleIoTSimulator useful in quickly creating simulated customer scenarios to give realistic sales demos. The simulation has also helped our customers visualize the power of Cognito Networks solutions prior to deployment."  
  -Kittur Nagesh, CEO
Cognito Networks
 
  More...  
 
 
Simulator Overview
 
SimpleIoTDecoy™
A Deceptive Honeypot for Intrusion Detection
 
 
 
Overview  
SimpleIoTDecoy is an easy to deploy, software based device simulator that acts as an intelligent honeypot to detect intrusions, while deceptively appearing just like any other device on your network.
SimpleIoTDecoy supports many of the common IoT and network management protocols like MQTT, CoAP, Modbus, BACnet, HTTP/s, SNMP, Telnet, SSH, IPMI, TL1, Netconf and even LoRa. The Decoy can "learn" from existing devices to duplicate them and then run inside your intranet on computers/VMs using unused IPs to create a mixture of real and decoy devices.
SimpleIoTDecoy, using patented technology, will then simply listen for incoming requests and respond to them appropriately based on the learnt data and log the interaction. It will also flag intrusions when it receives requests from unknown entities or receives requests that are different from ones it has received before from known entities. White lists of known entities and requests get automatically populated by accepting requests during a specified interval or created manually. Request fingerprinting is used to distinguish between similar requests sent from known entities that have been compromised.
Both IPv4 and IPv6 protocols are supported and SimpleIoTDecoy can run on physical as well as virtual machines.  
 
Benefits
The SimpleIoTDecoy adds one more security tool to an IT department's arsenal for intrusion detection within the intranet. When hackers infiltrate the intranet, they typically scan the network to discover the devices connected to it.
SimpleIoTDecoy device will show up alongside real devices in the scan and appear just as real. The Decoy will respond back to queries like a real device keeping the intruder engaged, while silently keeping a log of the requests made and raising an alarm to identify compromized servers used to send the requests.
The logs can be used to run forensics to analyze the mode of operation of the intruders without putting real resources at risk. Intrusion alerts can be forwarded to the main NMS in the form of SNMP traps and syslog messages. The logs can also be used to train machine learning algorithms for future intrusion detection.
 
Operation
Only a few simple steps are required to start using the SimpleIoTDecoy. They are:
  • Use the built-in learner utilities to record packet exchanges from real devices.
  • Use this learnt data as a template to create decoys and assign them unused IPs on your intranet.
  • Wait for SimpleIoTDecoy to detect intrusions and send alerts. Examine logs to run forensics.
Availability
Please email sales@simplesoft.com for limited trials.
 
System Requirements
  • 64-bit Linux OS.
 
 
 
 
   
SimpleAgentPro SimpleTester SimpleSleuth
SimpleAgentEnterprise SimpleTesterPro  
SimpleIoTSimulator  
SimpleAgent    
     
SimpleMIBEditor SimpleTester SimpleSnmpProxy
SimpleMIBEditorPro SimpleMIBBrowser SimpleIoTProxy
SimpleMIBBrowser SimpleAgent SimpleIoTDecoy
     
 
Support
FAQs
Training
Instructional Videos
Other Resources
Contact Support
 
Demo Software for Windows
Demo Software for Linux
Evaluation EULA
Product Tours
White Papers
SNMP Tutorial
Upgrades
About Us
Company
Partners
Careers
Success Stories
  
 
News
Press Releases
Product Updates
Blog
 
Contact
Contact SimpleSoft
Request More Information
WebEx Meeting Center
 
Copyright © 2019 SimpleSoft, Inc. All rights reserved. Privacy