ATTENTION: The software behind KU ScholarWorks is being upgraded to a new version. Starting July 15th, users will not be able to log in to the system, add items, nor make any changes until the new version is in place at the end of July. Searching for articles and opening files will continue to work while the system is being updated.
If you have any questions, please contact Marianne Reed at mreed@ku.edu .
Evaluating the Proliferation and Pervasiveness of Leaking Sensitive Data in the Secure Shell Protocol and in Internet Protocol Camera Frameworks
dc.contributor.advisor | Bardas, Alexandru G | |
dc.contributor.author | Andrews, Ron | |
dc.date.accessioned | 2020-06-14T21:31:31Z | |
dc.date.available | 2020-06-14T21:31:31Z | |
dc.date.issued | 2019-12-31 | |
dc.date.submitted | 2019 | |
dc.identifier.other | http://dissertations.umi.com/ku:16872 | |
dc.identifier.uri | http://hdl.handle.net/1808/30492 | |
dc.description.abstract | In George Orwell’s `nineteen eighty-four: A novel', there is fear regarding what “Big Brother”, knows due to the fact that even thoughts could be “heard”. Though we are not quite to this point, it should concern us all in what data we are transferring, both intentionally and unintentionally, and whether or not that data is being “leaked”. In this work, we consider the evolving landscape of IoT devices and the threat posed by the pervasive botnets that have been forming over the last several years. We look at two specific cases in this work. One being the practical application of a botnet system actively executing a Man in the Middle Attack against SSH, and the other leveraging the same paradigm as a case of eavesdropping on Internet Protocol (IP) cameras. For the latter case, we construct a web portal for interrogating IP cameras directly for information that they may be exposing. | |
dc.format.extent | 102 pages | |
dc.language.iso | en | |
dc.publisher | University of Kansas | |
dc.rights | Copyright held by the author. | |
dc.subject | Computer science | |
dc.subject | Authentication | |
dc.subject | Credential Harvesting | |
dc.subject | Eavesdropping | |
dc.subject | IoT | |
dc.subject | IP Camera | |
dc.subject | Man in the Middle | |
dc.title | Evaluating the Proliferation and Pervasiveness of Leaking Sensitive Data in the Secure Shell Protocol and in Internet Protocol Camera Frameworks | |
dc.type | Thesis | |
dc.contributor.cmtemember | Li, Fengjun | |
dc.contributor.cmtemember | Luo, Bo | |
dc.thesis.degreeDiscipline | Electrical Engineering & Computer Science | |
dc.thesis.degreeLevel | M.S. | |
dc.identifier.orcid | https://orcid.org/0000-0002-3056-4953 | |
dc.rights.accessrights | openAccess |
Files in this item
This item appears in the following Collection(s)
-
Engineering Dissertations and Theses [1055]
-
Theses [4088]