Please use this identifier to cite or link to this item: /library/oar/handle/123456789/107791
Title: Smart secure homes : a solution to the cyber security threats in our smart homes
Authors: Sinagra, Jayden (2022)
Keywords: Home automation
Computer security
Machine learning
Issue Date: 2022
Citation: Sinagra, J. (2022). Smart secure homes: a solution to the cyber security threats in our smart homes (Bachelor's dissertation).
Abstract: A smart home is made up of various smart devices connected to a network, each with a specific set of functions. These devices tend to simplify the lives of the users by providing services according to their requirements. Thus, resulting in a more comfortable, convenient and secure home. Problems occur when home cyber security systems are not strong enough (due to poor configuration or default passwords, for example) to stop unauthorized people from compromising a device connected to the network. In addition, some of the devices installed in smart homes do not have enough processing power to implement strong security features. These problems can be solved by placing a security device between the modem connecting to the Internet Service Provider (ISP) and the rest of the home network which aims to provide an extra layer of security in the network. This device can act as a firewall and/or an Intrusion Detection System (IDS). The aim of this project is to implement a security device, using either a personal computer or a Raspberry Pi, that secures a home network whilst requiring minimal technical know-how from the user. Snort 3, an IDS that features a new design and a superset of Snort 2, was used to inspect incoming requests to the network and warn the user if it detected a flood attack, such as an Internet Control Message Protocol (ICMP), Synchronize (SYN) or User Datagram Protocol (UDP) attack. Snort 3 was also configured to protect the internal network against such an attack. Results obtained during these attacks, such as network throughput, percentage Central Processing Unit (CPU) and memory usage, determined which device was the most efficient and provided the best performance.
Description: B.Sc. (Hons)(Melit.)
URI: https://www.um.edu.mt/library/oar/handle/123456789/107791
Appears in Collections:Dissertations - FacICT - 2022
Dissertations - FacICTCCE - 2022

Files in This Item:
File Description SizeFormat 
22BCE012.pdf
  Restricted Access
3.73 MBAdobe PDFView/Open Request a copy


Items in OAR@UM are protected by copyright, with all rights reserved, unless otherwise indicated.