Goals:
1. Contact Andra Zaharia and ask about:
-- Latest IoT attacks
-- Data sets
-- suggestions about how to proceed with research.
2. Bring references to life (what we took away from each)
3. Run a bigger Matlab example (4 x 4)
4. Create hierarchical diagram for IoT attack steps (either Finland heating system, or man in the middle paper)
5. Summary of recent paper in IoT (Azi and Ali)
6. Learn how to set up a honeypot (Azi and Ali)
7. In addition to the above, include in presentation:
-- timeline and abstract with highlighted contributions that week
-- Explain Metrics with a concrete example in the context of IoT security
-- Flesh out 2D HMM – (type, intent) as a function of time.
Monday: Memorial Day--Day Off
Tuesday: Presented our week 2 progress in the group discussion, as well as our plans for this week. Met with Coach and Aziz to discuss how we are going to go about collecting the data necessary and what sort of things to focus on for the upcoming weeks. Reached out to Andra Zaharia to see if there are any data sets we could use for our research and began searching for other data set sources. Practiced more with HMMs in Matlab. Looked into Man in the Middle (MitM) attacks and the hierarchy of events that lead to a successful attack. Updated the references on this website.
Wednesday: Read up some more on 2D-HMMs and how to implement them for our use. Researched the processes of attacking networks and created a diagram of the processes to go through for various different attacks on data, networks, control, and controllers. Researched how to set up a honeypot for data gathering of network attacks. Obtained a server from Digital Ocean and used Modern Honeypot Network to begin setting up the honeypot.
Thursday: Worked more with the honeypot, ran a larger HMM in Matlab for demonstration purposes. More research on processes to attack networks and the tools used to do so. Met with Coach, Aziz, and Ali over what to include on our presentation for Monday, as well as changes to our Abstract and weekly plan.
Friday: Finished up presentation for Monday. Contacted Andra Zaharia again and contacted Kuan Zhang to see if we could access any data sets for our project. Attempted to put a website on our honeypot server to attract attacks for data collection. Began the process of learning Kali linux and the tools necessary to attempt an attack on our own server in order to gain data, as well as to learn the process behind various network attacks.