Open Access iconOpen Access

ARTICLE

crossmark

MV-Honeypot: Security Threat Analysis by Deploying Avatar as a Honeypot in COTS Metaverse Platforms

by Arpita Dinesh Sarang1, Mohsen Ali Alawami2, Ki-Woong Park3,*

1 SysCore Lab. (Convergence Engineering for Intelligent Drone), Sejong University, Seoul, 05006, Republic of Korea
2 Division of Computer Engineering, Hankuk University of Foreign Studies, Yongin-si, 17035, Republic of Korea
3 Department of Information Security, Sejong University, Seoul, 05006, Republic of Korea

* Corresponding Author: Ki-Woong Park. Email: email

(This article belongs to the Special Issue: Advanced Security for Future Mobile Internet: A Key Challenge for the Digital Transformation)

Computer Modeling in Engineering & Sciences 2024, 141(1), 655-669. https://doi.org/10.32604/cmes.2024.053434

Abstract

Nowadays, the use of Avatars that are unique digital depictions has increased by users to access Metaverse—a virtual reality environment—through multiple devices and for various purposes. Therefore, the Avatar and Metaverse are being developed with a new theory, application, and design, necessitating the association of more personal data and devices of targeted users every day. This Avatar and Metaverse technology explosion raises privacy and security concerns, leading to cyber attacks. MV-Honeypot, or Metaverse-Honeypot, as a commercial off-the-shelf solution that can counter these cyber attack-causing vulnerabilities, should be developed. To fill this gap, we study user’s engagements with Avatars in Metaverse, analyze possible security vulnerabilities, and create a model named Simplified Avatar Relationship Association with Non-linear Gradient (SARANG) that draws the full diagram of infrastructure components and data flow through accessing Metaverse in this paper. We also determine the most significant threat for each component’s cyberattacks that will affect user data and Avatars. As a result, the commercial off-the-shelf (COTS) of the MV-Honeypot must be established.

Graphic Abstract

MV-Honeypot: Security Threat Analysis by Deploying Avatar as a Honeypot in COTS Metaverse Platforms

Keywords


Cite This Article

APA Style
Sarang, A.D., Alawami, M.A., Park, K. (2024). Mv-honeypot: security threat analysis by deploying avatar as a honeypot in COTS metaverse platforms. Computer Modeling in Engineering & Sciences, 141(1), 655-669. https://doi.org/10.32604/cmes.2024.053434
Vancouver Style
Sarang AD, Alawami MA, Park K. Mv-honeypot: security threat analysis by deploying avatar as a honeypot in COTS metaverse platforms. Comput Model Eng Sci. 2024;141(1):655-669 https://doi.org/10.32604/cmes.2024.053434
IEEE Style
A. D. Sarang, M. A. Alawami, and K. Park, “MV-Honeypot: Security Threat Analysis by Deploying Avatar as a Honeypot in COTS Metaverse Platforms,” Comput. Model. Eng. Sci., vol. 141, no. 1, pp. 655-669, 2024. https://doi.org/10.32604/cmes.2024.053434



cc Copyright © 2024 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 749

    View

  • 299

    Download

  • 0

    Like

Share Link