Assessment of IoT immunity against attacks using IoT honeypots /

Internet of Things (IoT), a collection of networked devices that autonomously communicate, share information, and manage their decisions. Unfortunately, these devices are equipped with attractive features that make them perfect targets to attackers, yet, lack even fundamental security. The stormy up...

Full description

Saved in:
Bibliographic Details
Main Author: Jeddah, Mohammed Yunusa (Author)
Format: Thesis
Language:English
Subjects:
Online Access:Click here to view 1st 24 pages of the thesis. Members can view fulltext at the specified PCs in the library.
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 033330000a22002890004500
008 190726s2019 my a f m 000 0 eng d
040 |a UIAM  |b eng  |e rda 
041 |a eng 
043 |a a-my--- 
100 1 |a Jeddah, Mohammed Yunusa,  |e author 
245 1 0 |a Assessment of IoT immunity against attacks using IoT honeypots /  |c by Mohammed Yunusa Jeddah 
264 1 |a Kuala Lumpur :  |b Kulliyyah of Engineering, International Islamic University Malaysia,  |c 2019 
300 |a xv, 72 leaves :  |b illustrations ;  |c 30cm. 
336 |2 rdacontent  |a text 
347 |2 rdaft  |a text file  |b PDF 
502 |a Thesis (MSCIE)--International Islamic University Malaysia, 2019. 
504 |a Includes bibliographical references (leaves 65-72). 
520 |a Internet of Things (IoT), a collection of networked devices that autonomously communicate, share information, and manage their decisions. Unfortunately, these devices are equipped with attractive features that make them perfect targets to attackers, yet, lack even fundamental security. The stormy upsurge in the quantity of these devices engender massive excitement to the community, but, exposes the network to malicious attackers who perceive them as low-hanging fruits. Obviously, there is anxiety over the guarantee of IoT immunity and safety. At the moment, there is no synchronization, as it concerns how to implement the security of these devices. The research tries to learn the weaknesses of IoT devices, focusing on the attacks via the most common IoT application layer protocols by means of existing IoT honeypots, investigating the most targeted IoT devices application protocols/ports and then benchmark the honeypots. Honeypots are fantastic research tools, used to protect, study, detect or waste the potential attacker's time and resources. Attack events were detected, logged, scrutinized using attack events visualizations tools. It was established that there are lots of IoT honeypots available, that are characterized based on intent and level of interaction with the attackers. Application layer attacks recorded are those over the Telnet (port 23), SSH (22) and HTTP (80 and 8080). Attacks on MQTT (port 1883/8883), UPnP (1900) CoAP (5683) could not be recorded, obviously due to restrictions and security majors on the public network used for the research. Dionaea and Cowrie proved more effective of the honeypots deployed. These results might not be the most accurate as the network used does not allow port forwarding. Location of deployment provides a momentous part in using honeypots for research activities. 
596 |a 1 
655 7 |a Theses, IIUM local 
690 |a Dissertations, Academic  |x Department of Electrical and Computer Engineering  |z IIUM 
710 2 |a International Islamic University Malaysia.  |b Department of Electrical and Computer Engineering 
856 4 |u http://studentrepo.iium.edu.my/handle/123456789/4351  |z Click here to view 1st 24 pages of the thesis. Members can view fulltext at the specified PCs in the library. 
900 |a sz to aaz-naw 
999 |c 441272  |d 471402 
952 |0 0  |6 XX(557571.1)  |7 0  |8 THESES  |9 763675  |a IIUM  |b IIUM  |c MULTIMEDIA  |g 0.00  |o XX(557571.1)  |p 11100409647  |r 1900-01-02  |t 1  |v 0.00  |y THESIS 
952 |0 0  |6 XX(557571.1) CD  |7 5  |8 THESES  |9 858490  |a IIUM  |b IIUM  |c MULTIMEDIA  |g 0.00  |o XX(557571.1) CD  |p 11100409648  |r 1900-01-02  |t 1  |v 0.00  |y THESISDIG