Hyppää sisältöön
    • Suomeksi
    • På svenska
    • In English
  • Suomi
  • Svenska
  • English
  • Kirjaudu
Hakuohjeet
JavaScript is disabled for your browser. Some features of this site may not work without it.
Näytä viite 
  •   Ammattikorkeakoulut
  • Turun ammattikorkeakoulu
  • Opinnäytetyöt (Avoin kokoelma)
  • Näytä viite
  •   Ammattikorkeakoulut
  • Turun ammattikorkeakoulu
  • Opinnäytetyöt (Avoin kokoelma)
  • Näytä viite

Enterprise IoT Device Visibility

Ho, Dung (2021)

 
Avaa tiedosto
Enterprise IoT Device Visibility (2.275Mt)
Lataukset: 


Ho, Dung
2021
All rights reserved. This publication is copyrighted. You may download, display and print it for Your own personal use. Commercial use is prohibited.
Näytä kaikki kuvailutiedot
Julkaisun pysyvä osoite on
https://urn.fi/URN:NBN:fi:amk-202102252699
Tiivistelmä
This thesis examines the common protocols that are used in Enterprise IoT devices, especially the Bluetooth protocol. Bluetooth is a wireless technology that had been used widely since it was introduced by Ericsson in 1994. There are also several vulnerabilities that need to be addressed.

It is very important to gain a better understanding of the Bluetooth protocol in an enterprise in order to implement a secure Intrusion Detection System (IDS) and optimize the use of these devices. The goal of the thesis was to provide Bluetooth visibility, to study threat scenarios arising from the use of IoT in the enterprise, and to examine how to extend a commercial IDS in the ICS.

The thesis presents the work by researching through various reputed magazines to collect all the IoT protocols and their specifications and a Bluetooth module is implemented in the ICSP - a specific system that had been developed by the commissioning company, Forescout Technologies Inc. The module was implemented by assessing each technology stack access such as Python, Lua, and specialized wireless access points like Cisco Meraki SDK, Aruba.

The final Bluetooth module functioned properly and I was able to retrieve the list of wireless devices with the principal information of each device. Despite that, this module is a small but important part of IDS whose purpose is to identify the assets, the first important phase in Threat modeling. For further development, the project can be implemented by using the Simple Network Management Protocol (SNMP), an effective way to monitor the local traffic. The whole module can be used to develop the IDS in various industries such as Energy, Water, Fleet, Healthcare.
Kokoelmat
  • Opinnäytetyöt (Avoin kokoelma)
Ammattikorkeakoulujen opinnäytetyöt ja julkaisut
Yhteydenotto | Tietoa käyttöoikeuksista | Tietosuojailmoitus | Saavutettavuusseloste
 

Selaa kokoelmaa

NimekkeetTekijätJulkaisuajatKoulutusalatAsiasanatUusimmatKokoelmat

Henkilökunnalle

Ammattikorkeakoulujen opinnäytetyöt ja julkaisut
Yhteydenotto | Tietoa käyttöoikeuksista | Tietosuojailmoitus | Saavutettavuusseloste