JackLeonard802 / CCC-410ITS-05

Jack Leonard's Capstone Documentation and Source Code Repository
0 stars 1 forks source link

Data Analysis #11

Open JackLeonard802 opened 1 year ago

JackLeonard802 commented 1 year ago

This portion will rely on the tools and techniques I research in order to construct a methodical approach to analyzing the data I gather not just from firmware extraction, but also from network traffic analysis.

JackLeonard802 commented 1 year ago
JackLeonard802 commented 1 year ago

Tools

JackLeonard802 commented 1 year ago

Techniques

Flow Analysis

While flow analysis is useful, it will likely take a back seat in this project due to the fact that it is very easy to determine the traffic flow of a single device over a given period of time.

Packet Analysis

This technique will likely be the most useful in the scope of the network traffic portion of this project. The details of packets sent/received from IoT devices can lend a good deal of insight into the information that these devices need to function, as well as data that is sent over the network unnecessarily.

Cohort Analysis

This technique involves breaking data into smaller, more manageable groups to be analyzed individually. This technique will likely prove useful during packet analysis, as well as during the analysis of the extracted firmware.

Time Series Analysis

This technique deals with analyzing the behavior of data over time. This can prove useful for future Wireshark captures, as it can lend insight into how the flow of network traffic from a device changes under different conditions.

JackLeonard802 commented 1 year ago

Organizational Techniques

The Data Analysis Method

Defining the question

This is a crucial step. Without a goal, or a question to answer, data is essentially useless. Data sources should also be determined during this step.

Collecting the data

This step is self explanatory. In this project I will use the tools listed for collecting data.

Cleaning the data

This step, also known as data scrubbing, involves removing unnecessary pieces of data from the pool. This will be very useful for future, long Wireshark captures, as well as when analyzing the extracted filesystems of devices.

Analyzing the data

Using the techniques listed above I will analyze the data I collect.

Visualizing and sharing your findings

This step brings together all findings in a coherent way. This will be very effective in the final presentation/demonstration of my work.