SweetCam: The Design of a Honeypot for IP Cameras

Loading...
Thumbnail Image
Journal Title
Journal ISSN
Volume Title
Perustieteiden korkeakoulu | Master's thesis
Date
2023-08-21
Department
Major/Subject
Security and Cloud Computing
Mcode
SCI3113
Degree programme
Master’s Programme in Security and Cloud Computing (SECCLO)
Language
en
Pages
58 + 1
Series
Abstract
Today, with the development of the Internet of Things (IoT), many IoT devices have become an integral part of people's daily lives, playing significant roles. Among them, IP cameras hold a crucial position. Due to their popularity and remote monitoring capabilities, IP cameras are highly attractive to hackers and can pose serious security issues once compromised. To enhance the security of IP cameras, using the honeypot can be a valuable approach. Honeypots protect genuine devices by creating deceptive yet highly similar ones. They divert attackers' attention away from the actual targets and gather their attack data for analysis, enabling the further study of defence mechanisms. There have been several IP camera honeypots, however, they either require the usage of real IP cameras, which increase the setting cost and complexity; or use ordinary recorded video, which can not provide the interaction abilities for attackers, making it hard to trap human attackers. Facing these drawbacks, this thesis is centred on how to build IP camera honeypots using 360-degree video/images, to provide interaction abilities for attackers without using real devices. In addition to presenting the design and implementation details of the honeypot, sample honeypots are also deployed on the cloud for ten days and gathered some attack data. These data are analysed from different aspects to show the attack scenario. Finally, the honeypot is compared with other IP camera honeypots from various aspects to demonstrate its exceptional features.
Description
Supervisor
Aura, Tuomas
Thesis advisor
Vasilomanolakis, Emmanouil
Keywords
Honeypot, IP Camera, Network Deception, Network Security, Internet of Things Security
Other note
Citation