Files
RAFAELE_92731800_RAMOS-PEREZ_92671800_2020.pdf
Open access - Adobe PDF
- 5.5 MB
Details
- Supervisors
- Faculty
- Degree label
- Abstract
- The purpose of this thesis is to study and analyze the limitations, in terms of security and performance, of the new Kunbus modules (i.e., Revolution Pi connect+ and DIO) based on Raspberry Pi Compute Module 3. For this purpose, we used vulnerability scanning softwares as well as offensive hacking tools such as, Metasploit, LOIC (Low Orbit Ion Cannon), Nikto, e.t.c. The performances of the Revolution Pi connect+ were measured based on the CPU load and the network load during an attack. For that matter, we started by a thorough analysis of the device from a hardware and software perspective. This allowed us to have a better understanding of the possible limitations and issues with such a device. Following that, we were able to set the different methods we wanted to use in order to achieve the objectives of our study. Those methods reach different aspects of the device, from hardware with the hard disk image cloning and communications to the DIO module, to software with the implementation of common services used on this kind of device. Our results showed that the Revolution Pi connect+ has some network and CPU limitations to perform its regular tasks during an attack. Indeed, the results depicted an important number of network packets being dropped as well as a high CPU usage depending on the strength of the attack. The results also demonstrated the robustness of the device with its communications towards the DIO module. In fact, during an attack there was no alteration in the regular workflow of the device, in regard to the communication between the Revolution Pi connect+ and the DIO module.