📞 +91-7667918914 | ✉️ ijarcce@gmail.com
International Journal of Advanced Research in Computer and Communication Engineering
International Journal of Advanced Research in Computer and Communication Engineering A monthly Peer-reviewed & Refereed journal
ISSN Online 2278-1021ISSN Print 2319-5940Since 2012
IJARCCE adheres to the suggestive parameters outlined by the University Grants Commission (UGC) for peer-reviewed journals, upholding high standards of research quality, ethical publishing, and academic excellence.
← Back to VOLUME 15, ISSUE 4, APRIL 2026

ConformityGate: Intelligent Honeypot-Based Intrusion Detection Framework for Secure IoT Networks

Deepak Marlecha, Zarana J Shah, Rishab P K, Netrang V Davey, Aditi Singh, Ms Charulatha R T

👁 10 views📥 0 downloads
Share: 𝕏 f in
Abstract: More gadgets connected online - hospitals, factories, cities - are opening new doors for hackers. Old security tools struggle to keep up. A fresh approach called ConformityGate steps in here. Instead of just blocking attacks, it guides them away quietly. Suspicious behavior triggers a hidden shift. Traffic gets rerouted without warning. Fake setups wait there, watching everything the attacker does. These decoys collect real-time details on how intruders operate. Behind the scenes, Python code runs the show. It talks to sensors scattered through the network. Data streams in nonstop: logins, device status, traffic patterns. When something odd crosses set limits, action follows fast. No loud alarms. Just smooth isolation. Alerts spread like ripples across linked devices. Evidence stays intact. Moves stay unseen. One test after another, through five fake IoT setups, showed it spots attacks 96.7% of the time. False alarms pop up just 2.9% of the time. Responses take an average of 1.6 seconds to kick in. That speed and precision beats older methods relying on signatures, odd behavior patterns, or machine learning models. Built tough but simple, ConformityGate fits real-world needs. It scales without breaking down. Works across many kinds of smart devices. Protection stays strong even when threats get clever. This isn’t theory - it runs where it matters.

Internet of Things security using honeypots and anomaly detection with cyber threat intelligence in network environments through transparent redirection and intrusion detection systems implemented in Python

How to Cite:

[1] Deepak Marlecha, Zarana J Shah, Rishab P K, Netrang V Davey, Aditi Singh, Ms Charulatha R T, “ConformityGate: Intelligent Honeypot-Based Intrusion Detection Framework for Secure IoT Networks,” International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE), DOI: 10.17148/IJARCCE.2026.154260

Creative Commons License This work is licensed under a Creative Commons Attribution 4.0 International License.