ATTENTION: The software behind KU ScholarWorks is being upgraded to a new version. Starting July 15th, users will not be able to log in to the system, add items, nor make any changes until the new version is in place at the end of July. Searching for articles and opening files will continue to work while the system is being updated. If you have any questions, please contact Marianne Reed at mreed@ku.edu .

Show simple item record

dc.contributor.advisorBardas, Alexandru G
dc.contributor.authorAndrews, Ron
dc.date.accessioned2020-06-14T21:31:31Z
dc.date.available2020-06-14T21:31:31Z
dc.date.issued2019-12-31
dc.date.submitted2019
dc.identifier.otherhttp://dissertations.umi.com/ku:16872
dc.identifier.urihttp://hdl.handle.net/1808/30492
dc.description.abstractIn George Orwell’s `nineteen eighty-four: A novel', there is fear regarding what “Big Brother”, knows due to the fact that even thoughts could be “heard”. Though we are not quite to this point, it should concern us all in what data we are transferring, both intentionally and unintentionally, and whether or not that data is being “leaked”. In this work, we consider the evolving landscape of IoT devices and the threat posed by the pervasive botnets that have been forming over the last several years. We look at two specific cases in this work. One being the practical application of a botnet system actively executing a Man in the Middle Attack against SSH, and the other leveraging the same paradigm as a case of eavesdropping on Internet Protocol (IP) cameras. For the latter case, we construct a web portal for interrogating IP cameras directly for information that they may be exposing.
dc.format.extent102 pages
dc.language.isoen
dc.publisherUniversity of Kansas
dc.rightsCopyright held by the author.
dc.subjectComputer science
dc.subjectAuthentication
dc.subjectCredential Harvesting
dc.subjectEavesdropping
dc.subjectIoT
dc.subjectIP Camera
dc.subjectMan in the Middle
dc.titleEvaluating the Proliferation and Pervasiveness of Leaking Sensitive Data in the Secure Shell Protocol and in Internet Protocol Camera Frameworks
dc.typeThesis
dc.contributor.cmtememberLi, Fengjun
dc.contributor.cmtememberLuo, Bo
dc.thesis.degreeDisciplineElectrical Engineering & Computer Science
dc.thesis.degreeLevelM.S.
dc.identifier.orcidhttps://orcid.org/0000-0002-3056-4953
dc.rights.accessrightsopenAccess


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record