Intrusion Detection in IoT: Attack Technologies, and Defense - Analyzing Threats in Network Traffic and Log Files with Focus on MQTT and CoAP

Payman Afshari

Research output: ThesisMaster's Thesis

Abstract

Integration of Internet of Things technologies into various sectors has resulted in the emergence of increasingly complex cyber threats that utilize protocols such as MQTT and CoAP. To address the issue, this thesis investigates vulnerabilities of these protocols to identify different types of threats presented by their use in IoT networks. The present thesis employs a comprehensive research design that includes theoretical analysis and practical simulations to classify a variety of attack vectors used to compromise IoT systems. Specifically, the results of the work suggest that threat vectors such as denial of service, protocol compromises, and payload manipulation are of great concern due to exploiting the arrested development of these protocols. Moreover, the work suggests the role of various logs and network traffic analysis in identifying unclear behaviors of these threats and the utility of advanced detection approaches. The latter recommendation assists in forming future scenarios where IoT attack detection may be instrumental.
Original languageEnglish
QualificationMaster of Science
Awarding Institution
  • University of Applied Sciences Technikum Wien
Supervisors/Advisors
  • Mense, Alexander, Supervisor, External person
  • Skopik, Florian, Supervisor
Award date1 May 2024
Publication statusPublished - 2024

Research Field

  • Cyber Security

Fingerprint

Dive into the research topics of 'Intrusion Detection in IoT: Attack Technologies, and Defense - Analyzing Threats in Network Traffic and Log Files with Focus on MQTT and CoAP'. Together they form a unique fingerprint.

Cite this