Repository logo
  • English
  • Deutsch
  • Español
  • Français
Log In
New user? Click here to register.
  1. Home
  2. Browse by Author

Browsing by Author "Mohammed Yunusa Jeddah"

Filter results by typing the first few letters
Now showing 1 - 1 of 1
  • Results Per Page
  • Sort Options
  • Loading...
    Thumbnail Image
    Some of the metrics are blocked by your 
    consent settings
    Publication
    Assessment of IoT immunity against attacks using IoT honeypots
    (Kuala Lumpur :Kulliyah of Engineering, International Islamic University Malaysia, 2019, 2019)
    Mohammed Yunusa Jeddah
    ;
    Internet of Things (IoT), a collection of networked devices that autonomously communicate, share information, and manage their decisions. Unfortunately, these devices are equipped with attractive features that make them perfect targets to attackers, yet, lack even fundamental security. The stormy upsurge in the quantity of these devices engender massive excitement to the community, but, exposes the network to malicious attackers who perceive them as low-hanging fruits. Obviously, there is anxiety over the guarantee of IoT immunity and safety. At the moment, there is no synchronization, as it concerns how to implement the security of these devices. The research tries to learn the weaknesses of IoT devices, focusing on the attacks via the most common IoT application layer protocols by means of existing IoT honeypots, investigating the most targeted IoT devices application protocols/ports and then benchmark the honeypots. Honeypots are fantastic research tools, used to protect, study, detect or waste the potential attacker's time and resources. Attack events were detected, logged, scrutinized using attack events visualizations tools. It was established that there are lots of IoT honeypots available, that are characterized based on intent and level of interaction with the attackers. Application layer attacks recorded are those over the Telnet (port 23), SSH (22) and HTTP (80 and 8080). Attacks on MQTT (port 1883/8883), UPnP (1900) CoAP (5683) could not be recorded, obviously due to restrictions and security majors on the public network used for the research. Dionaea and Cowrie proved more effective of the honeypots deployed. These results might not be the most accurate as the network used does not allow port forwarding. Location of deployment provides a momentous part in using honeypots for research activities.
      2

This site contains copyrighted unpublished research owned by International Islamic University Malaysia (IIUM) and(or) the owner of the research. No part of any material contained in or derived from any unpublished research may be used without written permission of the copyright holders or due acknowledgement.

Contact:
  • Dar al-Hikmah Library
    International Islamic University Malaysia (IIUM)
    P.O Box 10, 50728
    Kuala Lumpur
  • +603-64214829/4813
  • studentrepo@iium.edu.my
Follow Us:
Copyright © 2024: Dar al-Hikmah Library, IIUM
by CDSOL