|
| 1 | +# Project Day |
| 2 | + |
| 3 | + |
| 4 | + |
| 5 | +## Modules: |
| 6 | +1. **Connection Establishment** |
| 7 | +2. **Servers & Communication Establishment** |
| 8 | +3. **Static IP Address Allocation for All Devices** |
| 9 | +4. **Network Intrusion Detection System Establishment** |
| 10 | + |
| 11 | +## Completed: |
| 12 | + |
| 13 | +### Completed Module 1 - Connection Establishment ✅: |
| 14 | +- Configured Raspberry Pi as an access point and router. |
| 15 | +- Established connection between all devices. |
| 16 | +- All devices successfully connect to the virtual access point of the Raspberry Pi and access the network. |
| 17 | + |
| 18 | +### Completed Module 2 - Servers & Communication Establishment ✅: |
| 19 | +- Set up an **MQTT server** for data transmission from the Arduino board. |
| 20 | +- Established a **dashboard** for mobile phone access. |
| 21 | + |
| 22 | +### Completed Module 3 - Static IP Address Allocation ✅: |
| 23 | +- Allocated static IP addresses for all devices in the network. |
| 24 | + |
| 25 | +## Objectives For The Day: |
| 26 | +- **Implementation of a Honeypot** |
| 27 | +- **Proceed with security configurations** |
| 28 | +- **Firewall & IDS configurations** |
| 29 | +- Configure **PSAD** to flag attacker IPs and redirect all traffic from flagged IPs to the honeypot. |
| 30 | +- Mitigate **MAC spoofing risks** due to static IP allocation. |
| 31 | +- Perform **network security testing** to ensure no compromise. |
| 32 | +- **Secure the MQTT protocol** `Applied Cryptography`. |
| 33 | + |
| 34 | + |
| 35 | +### Next Steps: |
| 36 | +- Strengthen network security through **firewall rules**. |
| 37 | +- Test and validate **intrusion detection** mechanisms. |
| 38 | +- Enhance **authentication and encryption** for MQTT communications. `Applied Crypto` |
| 39 | + |
| 40 | +📌 **Status:** _Work in Progress_ |
0 commit comments