kth.sePublications KTH
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Analys av IoT-botnät och optimering av Cowrie Honeypot
KTH, School of Engineering Sciences in Chemistry, Biotechnology and Health (CBH), Biomedical Engineering and Health Systems, Health Informatics and Logistics.
KTH, School of Engineering Sciences in Chemistry, Biotechnology and Health (CBH), Biomedical Engineering and Health Systems, Health Informatics and Logistics.
2025 (Swedish)Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesisAlternative title
Analysis of IoT-botnet and Optimiza-tion of Cowrie Honeypot (English)
Abstract [sv]

I och med antalet ökade IoT-enheter och deras ofta bristande säkerhet ökar risken för cyberangrepp. Därför är det av stor betydelse att samla in och analysera inform-ation om dessa attacker, samt att effektivt kunna använda sig av verktyg som ho-neypots för att samla in information. Honeypot som Cowrie med standardkonfigu-ration kan avslöjas av angripare genom att undersöka dess variabler. I detta arbete användes SSH-klienten Termius för att ansluta och interagera med Cowrie. Det för att undersöka vilka variabler som kan avslöja Cowrie som en Honeypot. Ett Pyt-hon-skript och lösenordsattacksverktyget Hydra användes för att simulera attacker mot Cowrie med standardkonfiguration och därefter med ändrad konfiguration. Detta både mot Cowrie i en virtuell miljö och på Raspberry Pi. Cowrie i virtuell miljö exponerades på Internet för att samla data från verkliga attacker. Standard-konfigurerad Cowrie kunde lätt identifieras som en Honeypot. Konfigurationsänd-ringar ökade Cowries trovärdighet, antalet inloggningsförsök och vidare interakt-ioner. Cowrie som exponerades på Internet med ändrade konfigurationer samlade information som kan tyda på utnyttjande av Cowrie för vidare kommunikation och attacker. Cowrie visade god förmåga att logga aktiviteter. Avslutade sessioner och brisande stöd för kommandon begränsade möjligheterna att samla djupare in-formation.

Abstract [en]

With the increasing number of IoT devices and their lack of security, the risk of cyberattacks is rising. Therefore, it is of great importance to collect and analyze information about these attacks, as well as to effectively utilize tools such as honey-pots to gather relevant data. Honeypots such as Cowrie with standard configura-tion can be detected by attackers by examining its variables. In this project the SSH-client Termius was used to connect and interact with Cowrie. This to examine variables that can reveal Cowrie as Honeypot. A Python-script and password attack tool Hydra was used to simulate attacks on Cowrie with standard configuration and thereafter with modified configuration. This was done both in Cowrie in a virtual environment and on Raspberry Pi. Cowrie in a virtual environment was exposed to the Internet to gather information from real attacks. Cowrie with standard config-uration could easily be identified as a Honeypot. Modified configurations increased Cowrie’s credibility, the numbers of attacks and further interactions. Cowrie with modified configurations that was exposed on the Internet gathered information that could indicate potential use for further communication and attacks. Cowrie showed good logging capabilities, however session terminations and insufficient command support limited the potential for collecting more in-depth information.

Place, publisher, year, edition, pages
2025.
Series
TRITA-CBH-GRU ; 089
Keywords [en]
Cowrie, Honeypot, IoT-botnet, Brute force, Raspberry Pi, simulation, VMware, Kali Linux.
Keywords [sv]
Cowrie, Honeypot, IoT-botnät, Brute force, Raspberry Pi, simulering, VMware, Kali Linux.
National Category
Security, Privacy and Cryptography
Identifiers
URN: urn:nbn:se:kth:diva-364099OAI: oai:DiVA.org:kth-364099DiVA, id: diva2:1963674
Educational program
Bachelor of Science in Engineering - Computer Engineering
Supervisors
Examiners
Available from: 2025-06-04 Created: 2025-06-03 Last updated: 2025-06-04Bibliographically approved

Open Access in DiVA

Analys av IoT-botnät och optimering av Cowrie Honeypot(1836 kB)109 downloads
File information
File name FULLTEXT01.pdfFile size 1836 kBChecksum SHA-512
440ed1fe56f97b6f8d2ed8a7a60368d86305e6fecff5050b88cc9e0cc00a94772ffe1ebb9b9d4af06994ec8627500a48b81d5450156fb9c21ff322808bed9be6
Type fulltextMimetype application/pdf

By organisation
Health Informatics and Logistics
Security, Privacy and Cryptography

Search outside of DiVA

GoogleGoogle Scholar
Total: 109 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

urn-nbn

Altmetric score

urn-nbn
Total: 242 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf