Open JackLeonard802 opened 1 year ago
While flow analysis is useful, it will likely take a back seat in this project due to the fact that it is very easy to determine the traffic flow of a single device over a given period of time.
This technique will likely be the most useful in the scope of the network traffic portion of this project. The details of packets sent/received from IoT devices can lend a good deal of insight into the information that these devices need to function, as well as data that is sent over the network unnecessarily.
This technique involves breaking data into smaller, more manageable groups to be analyzed individually. This technique will likely prove useful during packet analysis, as well as during the analysis of the extracted firmware.
This technique deals with analyzing the behavior of data over time. This can prove useful for future Wireshark captures, as it can lend insight into how the flow of network traffic from a device changes under different conditions.
This is a crucial step. Without a goal, or a question to answer, data is essentially useless. Data sources should also be determined during this step.
This step is self explanatory. In this project I will use the tools listed for collecting data.
This step, also known as data scrubbing, involves removing unnecessary pieces of data from the pool. This will be very useful for future, long Wireshark captures, as well as when analyzing the extracted filesystems of devices.
Using the techniques listed above I will analyze the data I collect.
This step brings together all findings in a coherent way. This will be very effective in the final presentation/demonstration of my work.
This portion will rely on the tools and techniques I research in order to construct a methodical approach to analyzing the data I gather not just from firmware extraction, but also from network traffic analysis.