En cours

ANALYSIS OF TRENDS AND THREATS OF INTERNET OF THINGS USING A HONEYPOT -- 2

The year 2020 was predicted to be the most effective year for IoT revolution. , we are already witnessing the presence of IoT devices and the increment in their uses for many practical problems. The rapidly increasing number of attacks is posing a huge problem for the IoT community. The IoT devices are deemed attractive by the attackers and vice-versa. They have limited power and memory and computing processers hence are often not protected by anti-virus software and are always connected to the internet with unchanged default login credentials. Many studies use deception tool as their data capturing method to study the behavior of attackers with their default configurations. Most times, attackers are smart enough to use this information to avoid falling into the traps.

Hence, this research will investigate the effects of increasing the level of deception of the tool. To analyze the trends and threats of common attacks on IoT devices, as well as to identify new types of malware. This research will focus on the threat of botnets on IoT devices using the cloud computing implemented by a honeypot to analyzes the threats .

The literature must be first reviewed and summarized from the three key areas, which are: the IoT devices, the botnet threats, and the existing tools. Upon choosing the existing tool, which is the honeypot, as the base for technical mechanism for enhancements, The enhanced honeypots would be deployed for a period of four weeks. Data collected will be analyzed to derive to a reliable conclusion for this research.

Keywords: IoT, Threats, Honeypot, Malware, Cloud Computing, Security.

Compétences : Sécurité Informatique, Administration de réseaux, Rédaction scientifique, Sécurité Web, TSF

en voir plus : design home page layout using a theme -- 2, design home page layout using a theme 2, 9 using a product of your choice evaluate the content and purpose of the product design, finding and using a web service, how do i advertise myself and i m looking for a job in internet, how to set up a communications website for free and not using a email, i would like someone to design my logo for use on my website and email signature i have a clear idea of what i want thanks, using html and javascript you have create a web page that allows users to choose the design of a sofa, using html and javascript you have create a web page that allows users to choose the design of a sofa see figure 1, Data analysis, interpretation and processing for a regression (Machine learning) , customer wanted to know the balance in the account and decided to make a payment using a credit card., open gl to draw 2d primitive shapes and transform them and animate them over number a scenes using various animation and viewing, I need two things done. I will need a mockup of a website done for my store, i sell only two products using the shopify platform, sentiment analysis algorithms and applications: a survey, you are currently using a free version of teamviewer on your business network, what are some advantages and disadvantages of using a scoring model for selecting projects?, finite element analysis applications and solved problems using abaqus pdf, developing and using a case formulation to guide cognitive-behavior therapy, cybersecurity in healthcare: a narrative review of trends, threats and ways forward, data strategy: how to profit from a world of big data, analytics and the internet of things pdf

Concernant l'employeur :
( 0 commentaires ) Tabuk, Saudi Arabia

Nº du projet : #19931476

Décerné à:

PhpWebD

Hello, I’m a developer and a security researcher listed in Facebook’s, Google’s and Yahoo’s HOFs. I also have huge experience when it comes to writing researches, I’m currently at my third year as an engineering stud Plus

%selectedBids___i_sum_sub_7% %project_currencyDetails_sign_sub_8% USD en 10 jours
(0 Commentaires)
0.0

11 freelance font une offre moyenne de $2239 pour ce travail

rozeny2k

Hi, I am an experienced technical and academic writer with an MS in CSE. I have completed 300+ techncial and academic writing projects on IT Security, Digital Forensic, Network Administration, SYstem Administration, Cl Plus

%bids___i_sum_sub_35% %project_currencyDetails_sign_sub_36% USD en 30 jours
(225 Commentaires)
7.4
izzo84

I have a Bachelor Degree in Computer Science & proficient in Cloud Computing, Big Data, IoT, Software Engineering, I.T, Computer Security, Networking, Web Technologies, Project Management, and Office

%bids___i_sum_sub_35% %project_currencyDetails_sign_sub_36% USD en 30 jours
(131 Commentaires)
5.9
devexpertsteam

Hello, We are IT-Engineers and Business Analysts, creating complete web and mobile solutions, for already more than 15 years, supporting our products with custom digital marketing strategies and instruments. Befo Plus

%bids___i_sum_sub_35% %project_currencyDetails_sign_sub_36% USD en 30 jours
(2 Commentaires)
5.3
AhmadSameer

Hey there, I have been in the Information Security arena for years. I had conducted tons of Computer Security related projects. I'm a former black hat hacker as well. I can help. Regards.

%bids___i_sum_sub_35% %project_currencyDetails_sign_sub_36% USD en 30 jours
(38 Commentaires)
5.2
hsh564cf84accd96

I am a professional academic writer and well researcher with more than seven years of experience in writing. I am familiar with Harvard, APA, MLA, Chicago and IEEE style. I am certain I will deliver each order you gi Plus

%bids___i_sum_sub_35% %project_currencyDetails_sign_sub_36% USD en 30 jours
(23 Commentaires)
4.7
SidraSadaqat

Hi, I have read the description and can assist you with doing an ANALYSIS OF TRENDS AND THREATS OF INTERNET OF THINGS USING A HONEYPOT. I have my masters in Software Engineering from the University of Karachi. Please Plus

%bids___i_sum_sub_35% %project_currencyDetails_sign_sub_36% USD en 30 jours
(23 Commentaires)
4.2
Yankirex

Wow, as a full time researcher and PHD student, i major on Smart cuties and I definitely know how the IoT works. The sensors really can be attacked as proven in recent researches. I look forward to working on this with Plus

%bids___i_sum_sub_35% %project_currencyDetails_sign_sub_36% USD en 14 jours
(5 Commentaires)
3.7
brahimglata

Hello Sir/Madam, I am a highly experienced and skilled cyber security consultant. I have 9 years of experience in the navy as a network and information security officer. Also i have experience as a freelancer. I hav Plus

%bids___i_sum_sub_35% %project_currencyDetails_sign_sub_36% USD en 45 jours
(3 Commentaires)
3.1
ShubhamTT

I have experience in cybersecurity and i have the very good understanding of cybersecurity technology, and vulnerabilities. My job responsibilities included penetration testing and vulnerability assessment of IT system Plus

%bids___i_sum_sub_35% %project_currencyDetails_sign_sub_36% USD en 7 jours
(4 Commentaires)
2.1
beemf1633

Asslam o Alikum!I'm electrical engineer and a teacher in University. I am teaching about IOT since 2013 I have done a lot of projects on IOT already and collected a lot of data including future horizons in the form of Plus

%bids___i_sum_sub_35% %project_currencyDetails_sign_sub_36% USD en 5 jours
(4 Commentaires)
1.8