Publication:
Assessment of IoT immunity against attacks using IoT honeypots

dc.contributor.affiliation#PLACEHOLDER_PARENT_METADATA_VALUE#en_US
dc.contributor.authorMohammed Yunusa Jeddahen_US
dc.date.accessioned2024-10-08T03:20:54Z
dc.date.available2024-10-08T03:20:54Z
dc.date.issued2019
dc.description.abstractInternet of Things (IoT), a collection of networked devices that autonomously communicate, share information, and manage their decisions. Unfortunately, these devices are equipped with attractive features that make them perfect targets to attackers, yet, lack even fundamental security. The stormy upsurge in the quantity of these devices engender massive excitement to the community, but, exposes the network to malicious attackers who perceive them as low-hanging fruits. Obviously, there is anxiety over the guarantee of IoT immunity and safety. At the moment, there is no synchronization, as it concerns how to implement the security of these devices. The research tries to learn the weaknesses of IoT devices, focusing on the attacks via the most common IoT application layer protocols by means of existing IoT honeypots, investigating the most targeted IoT devices application protocols/ports and then benchmark the honeypots. Honeypots are fantastic research tools, used to protect, study, detect or waste the potential attacker's time and resources. Attack events were detected, logged, scrutinized using attack events visualizations tools. It was established that there are lots of IoT honeypots available, that are characterized based on intent and level of interaction with the attackers. Application layer attacks recorded are those over the Telnet (port 23), SSH (22) and HTTP (80 and 8080). Attacks on MQTT (port 1883/8883), UPnP (1900) CoAP (5683) could not be recorded, obviously due to restrictions and security majors on the public network used for the research. Dionaea and Cowrie proved more effective of the honeypots deployed. These results might not be the most accurate as the network used does not allow port forwarding. Location of deployment provides a momentous part in using honeypots for research activities.en_US
dc.description.degreelevelMasteren_US
dc.description.identifierThesis : Assessment of IoT immunity against attacks using IoT honeypots /by Mohammed Yunusa Jeddahen_US
dc.description.identityt11100409647MohammedYunusaJeddahen_US
dc.description.kulliyahKulliyyah of Engineeringen_US
dc.description.notesThesis (MSCIE)--International Islamic University Malaysia, 2019.en_US
dc.description.physicaldescriptionxv, 72 leaves : illustrations ; 30cm.en_US
dc.description.programmeDepartment of Electrical and Computer Engineeringen_US
dc.identifier.urihttps://studentrepo.iium.edu.my/handle/123456789/7266
dc.identifier.urlhttps://lib.iium.edu.my/mom/services/mom/document/getFile/Tglv48hlqD3v8wMXNT06LJ2qdFfvDFaS20200709081605358
dc.language.isoenen_US
dc.publisherKuala Lumpur :Kulliyah of Engineering, International Islamic University Malaysia, 2019en_US
dc.rightsCopyright International Islamic University Malaysia
dc.titleAssessment of IoT immunity against attacks using IoT honeypotsen_US
dc.typeMaster Thesisen_US
dspace.entity.typePublication

Files

Original bundle

Now showing 1 - 2 of 2
Loading...
Thumbnail Image
Name:
t11100409647MohammedYunusaJeddah_SEC_24.pdf
Size:
422.66 KB
Format:
Adobe Portable Document Format
Description:
24 pages file
Loading...
Thumbnail Image
Name:
t11100409647MohammedYunusaJeddah_SEC.pdf
Size:
1.23 MB
Format:
Adobe Portable Document Format
Description:
Full text secured file

Collections