DATX02-21-58 Honeypot Honugskruka i sakernas internet

Background

According to a 2020 report by Business Insider there were around 8 billion active IoT devices the previous year. By 2027, they project this number to be 41 billion. The budget for securing inexpensive IoT devices is often compromised due to demands from customers that the devices be as cheap as possible and companies looking to maximize profits. Hackers have targeted internet connected devices for a long time, but it took until 2016, which was when the Mirai botnet surfaced for people to realize how destructive a botnet of IoT devices can be.

Project description

The end product The goal of this project is to develop a honeypot that captures automated attacks originating from . It shall implement at least one of the Telnet/SSH protocols, and to some extent mimic the shell of an IOT device when something logs in and interacts with it. Information like the IP address, username/password, and what they try to do once logged in, shall be logged by the honeypot. It is up to the group members to decide on additional protocols and features the honeypot shall support/implement if time is available. For example the authors could choose to send notifications to the user when it is attacked, implement a web interface for easy visualization of all the attacks, or additional protocols such as RDP, ADB, or just a simple http login portal.

The choice of programming language is also up to the authors, but Python is an attractive option due to its ease of use, widespread usage, and available libraries. The finished product shall be published as free software, and should be able to run natively on an inexpensive Linux host for many days without interruption.

The focus area

The focus of this project lies within the field, namely to develop an application to aid computer security researchers discover new and threats to IoT devices. The secondary focus is to analyze the team members own findings using the application, shed light on how IoT devices currently are being attacked, and how to defend against it.

Suggested reading material

The below resources are only suggestions, any resource that allows the reader to familiarize himself with any of the prerequisites for this project is good.

● Computer Networking: A Top-Down Approach. Authors: James Kurose and Keith Ross ● Stallings & Brown: Computer Security, Pearson 2012, ISBN: 978-0-273-76449-6 ● https://blog.cloudflare.com/inside-mirai-the-infamous-iot-botnet-a-retrospective-analy sis/ ● https://ieeexplore.ieee.org/document/8859496 ● https://www.kaspersky.com/resource-center/threats/what-is-a-honeypot ● https://www.resilient-iot.se/

Specific prerequisites ● Programming experience ● Some knowledge of computer malware ● Some knowledge of networking protocols ● Some knowledge about Linux

Target group DV, IT, D

Proposal authors

Alexander Lysholm & Magnus Jonsson Supervisors

Main supervisor: Francisco Blas Izquierdo Riera ​ Backup supervisor: Magnus Almgren ​