Please use this identifier to cite or link to this item: http://hdl.handle.net/10609/127728
Title: IoT honeypot: firmware rehosting
Author: Moltó García, Josep
Director: Garcia-Font, Victor  
Tutor: Hernández Gañán, Carlos  
Abstract: The proliferation of IoT devices in the last few years and the increase of the vulnerabilities that has appeared in these devices has led to an increase in attacks of this class of devices in particular. This work demonstrates how to emulate a firmware of an IoT device with a different hardware that the real device with a technique known as rehosting and then publish an application of this firmware on the Internet and track all connections from the outside networking coming to our emulated firmware which at this moment is acting as a honeypot. Which this system working, it is shown that performing a honeypot to detect vulnerabilities in a firmware is a good option to know if a firmware is vulnerable, as well as if is not to know what is the strategy that attackers have used to compromise the system. It is also shown that having an IoT device on the Internet carries a high risk because there are a big number of automated system attackers trying to compromise the device.
Keywords: Internet of things
honeypot
rehosting
Document type: info:eu-repo/semantics/masterThesis
Issue Date: Jan-2021
Publication license: http://creativecommons.org/licenses/by-sa/3.0/es/  
Appears in Collections:Trabajos finales de carrera, trabajos de investigación, etc.

Files in This Item:
File Description SizeFormat 
jmoltogaTFM0121memòria.pdfMemòria del TFM1,88 MBAdobe PDFThumbnail
View/Open