The year 2020 was predicted to be the most effective year for IoT revolution. , we are already witnessing the presence of IoT devices and the increment in their uses for many practical problems. The rapidly increasing number of attacks is posing a huge problem for the IoT community. The IoT devices are deemed attractive by the attackers and vice-versa. They have limited power and memory and computing processers hence are often not protected by anti-virus software and are always connected to the internet with unchanged default login credentials. Many studies use deception tool as their data capturing method to study the behavior of attackers with their default configurations. Most times, attackers are smart enough to use this information to avoid falling into the traps.
Hence, this research will investigate the effects of increasing the level of deception of the tool. To analyze the trends and threats of common attacks on IoT devices, as well as to identify new types of malware. This research will focus on the threat of botnets on IoT devices using the cloud computing implemented by a honeypot to analyzes the threats .
The literature must be first reviewed and summarized from the three key areas, which are: the IoT devices, the botnet threats, and the existing tools. Upon choosing the existing tool, which is the honeypot, as the base for technical mechanism for enhancements, The enhanced honeypots would be deployed for a period of four weeks. Data collected will be analyzed to derive to a reliable conclusion for this research.
Keywords: IoT, Threats, Honeypot, Malware, Cloud Computing, Security.
9 freelanceria on tarjonnut keskimäärin %project_bid_stats_avg_sub_26% %project_currencyDetails_sign_sub_27% tähän työhön
HI I am software engineer and have delivered many research and technical projects. You can share more details with me so that we can negotiate the price accordingly. Thank you