IoT devices provide immense contributions in fields of education, communication, business, science, industrial zones, permeating various aspects of everyday life. Despite these benefits, their diversity, heterogeneity, and rapid development can introduce significant challenges, especially when the secure design has not been incorporated into their software lifecycle. Consequently, they can be targeted by malicious attackers, resulting in important security threats that need to be addressed. The main goal of this research is to explore the benefits of securing IoT devices after deployment, by examining, analyzing, and comparing default vs secure IoT device configurations. This will allow us to make assumptions regarding the differences in behavior, patterns, and motives of the attackers, as well as to measure the performance output between the two environments. To achieve our goal, we make extensive use of honeypot systems simulating the two different environments and collect log data to conclude meaningful information. As a secondary goal, we also explore any potential performance degradation for default vs secure configurations. The produced results suggest that there is a major difference both in terms of how the attackers approach a hardened IoT device/service, and how a device is affected in terms of operability and performance.
Identifer | oai:union.ndltd.org:UPSALLA1/oai:DiVA.org:ltu-83187 |
Date | January 2021 |
Creators | Marinakis, Alexandros |
Publisher | Luleå tekniska universitet, Institutionen för system- och rymdteknik |
Source Sets | DiVA Archive at Upsalla University |
Language | English |
Detected Language | English |
Type | Student thesis, info:eu-repo/semantics/bachelorThesis, text |
Format | application/pdf |
Rights | info:eu-repo/semantics/openAccess |
Page generated in 0.0017 seconds