Nesnelerin İnterneti Sistemlerine Yapılan Saldırıların Analizi Üzerine Tuzak Sistemler ile Bir Durum Çalışması
xmlui.mirage2.itemSummaryView.MetaDataShow full item record
With the development of technology, devices connected to the Internet are becoming increasingly widespread. Almost every field in the present day is making use of the opportunities provided by the Internet. With the increasing awareness of these devices, cyber attackers have also put these systems on the target board. These systems do not have the defense mechanisms that systems like computers or servers have. Therefore, classical techniques can’t be applied in defensive methods. In the simplest sense, the internet of things (IoT) can be any physical device connected to the internet. The resources of the sensor devices used on the Internet of things, namely memory (ROM and RAM), CPU and storage space are limited. Generally, sensors that collect data transmit data from the machine to the machine (M2M) and send the data to a specific center. Such devices form part of the Internet of Things (IOT) when connected to a network. One or more of the management protocols must be active in their systems to provide and manage access to these systems. In this work, an attack simulation environment and honeypot system is designed for the Telnet protocol of internet of things and the commonly used MQTT protocol. This study covers commonly known attack methods made by the aforementioned protocols. In the study, known attacks for each protocol were tried and the results were shared. In addition, various attacks were implemented to a real IP camera system and the results were shared.