Please use this identifier to cite or link to this item:
http://hdl.handle.net/10609/127728
Title: | IoT honeypot: firmware rehosting |
Author: | Moltó García, Josep |
Director: | Garcia-Font, Victor |
Tutor: | Hernández Gañán, Carlos |
Abstract: | The proliferation of IoT devices in the last few years and the increase of the vulnerabilities that has appeared in these devices has led to an increase in attacks of this class of devices in particular. This work demonstrates how to emulate a firmware of an IoT device with a different hardware that the real device with a technique known as rehosting and then publish an application of this firmware on the Internet and track all connections from the outside networking coming to our emulated firmware which at this moment is acting as a honeypot. Which this system working, it is shown that performing a honeypot to detect vulnerabilities in a firmware is a good option to know if a firmware is vulnerable, as well as if is not to know what is the strategy that attackers have used to compromise the system. It is also shown that having an IoT device on the Internet carries a high risk because there are a big number of automated system attackers trying to compromise the device. |
Keywords: | Internet of things honeypot rehosting |
Document type: | info:eu-repo/semantics/masterThesis |
Issue Date: | Jan-2021 |
Publication license: | http://creativecommons.org/licenses/by-sa/3.0/es/ |
Appears in Collections: | Trabajos finales de carrera, trabajos de investigación, etc. |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
jmoltogaTFM0121memòria.pdf | Memòria del TFM | 1,88 MB | Adobe PDF | View/Open |
Share:
This item is licensed under a Creative Commons License