The year 2020 was predicted to be the most effective year for IoT revolution. , we are already witnessing the presence of IoT devices and the increment in their uses for many practical problems. The rapidly increasing number of attacks is posing a huge problem for the IoT community. The IoT devices are deemed attractive by the attackers and vice-versa. They have limited power and memory and computing processers hence are often not protected by anti-virus software and are always connected to the internet with unchanged default login credentials. Many studies use deception tool as their data capturing method to study the behavior of attackers with their default configurations. Most times, attackers are smart enough to use this information to avoid falling into the traps.
Hence, this research will investigate the effects of increasing the level of deception of the tool. To analyze the trends and threats of common attacks on IoT devices, as well as to identify new types of malware. This research will focus on the threat of botnets on IoT devices using the cloud computing implemented by a honeypot to analyzes the threats .
The literature must be first reviewed and summarized from the three key areas, which are: the IoT devices, the botnet threats, and the existing tools. Upon choosing the existing tool, which is the honeypot, as the base for technical mechanism for enhancements, The enhanced honeypots would be deployed for a period of four weeks. Data collected will be analyzed to derive to a reliable conclusion for this research.
Keywords: IoT, Threats, Honeypot, Malware, Cloud Computing, Security.
Hello, I’m a developer and a security researcher listed in Facebook’s, Google’s and Yahoo’s HOFs. I also have huge experience when it comes to writing researches, I’m currently at my third year as an engineering stud Plus
11 freelance font une offre moyenne de $2239 pour ce travail
Hi, I am an experienced technical and academic writer with an MS in CSE. I have completed 300+ techncial and academic writing projects on IT Security, Digital Forensic, Network Administration, SYstem Administration, Cl Plus
I have a Bachelor Degree in Computer Science & proficient in Cloud Computing, Big Data, IoT, Software Engineering, I.T, Computer Security, Networking, Web Technologies, Project Management, and Office
Hello, We are IT-Engineers and Business Analysts, creating complete web and mobile solutions, for already more than 15 years, supporting our products with custom digital marketing strategies and instruments. Befo Plus
Hey there, I have been in the Information Security arena for years. I had conducted tons of Computer Security related projects. I'm a former black hat hacker as well. I can help. Regards.
I am a professional academic writer and well researcher with more than seven years of experience in writing. I am familiar with Harvard, APA, MLA, Chicago and IEEE style. I am certain I will deliver each order you gi Plus
Hi, I have read the description and can assist you with doing an ANALYSIS OF TRENDS AND THREATS OF INTERNET OF THINGS USING A HONEYPOT. I have my masters in Software Engineering from the University of Karachi. Please Plus
Wow, as a full time researcher and PHD student, i major on Smart cuties and I definitely know how the IoT works. The sensors really can be attacked as proven in recent researches. I look forward to working on this with Plus
Hello Sir/Madam, I am a highly experienced and skilled cyber security consultant. I have 9 years of experience in the navy as a network and information security officer. Also i have experience as a freelancer. I hav Plus
I have experience in cybersecurity and i have the very good understanding of cybersecurity technology, and vulnerabilities. My job responsibilities included penetration testing and vulnerability assessment of IT system Plus
Asslam o Alikum!I'm electrical engineer and a teacher in University. I am teaching about IOT since 2013 I have done a lot of projects on IOT already and collected a lot of data including future horizons in the form of Plus