Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Defending IoT Infrastructures with the Raspberry Pi - Chet Hosmer

Defending IoT Infrastructures with the Raspberry Pi

Monitoring and Detecting Nefarious Behavior in Real Time

(Autor)

Buch | Softcover
XIV, 168 Seiten
2018
Apress (Verlag)
978-1-4842-3699-4 (ISBN)
CHF 41,90 inkl. MwSt
  • Versand in 15-20 Tagen
  • Versandkostenfrei
  • Auch auf Rechnung
  • Artikel merken
  • The first book to put together coverage of IoT, Raspberry Pi, Python, and cybersecurity
  • Addresses the critical need to secure IoT devices and their rapidly growing infrastructure
  • Provides a unique use of the application of the Raspberry Pi

Apply a methodology and practical solutions for monitoring the behavior of the Internet of Things (IoT), industrial control systems (ICS), and other critical network devices with the inexpensive Raspberry Pi. With this book, you will master passive monitoring and detection of aberrant behavior, and learn how to generate early indications and warning of attacks targeting IoT, ICS, and other critical network resources.

Defending IoT Infrastructures with the Raspberry Pi provides techniques and scripts for the discovery of dangerous data leakage events emanating from IoT devices. Using Raspbian Linux and specialized Python scripts, the book walks through the steps necessary to monitor, detect, and respond to attacks targeting IoT devices.

There are several books that cover IoT, IoT security, Raspberry Pi, and Python separately, but this book is the first of its kind to put them all together. It takes a practical approach, providing an entry point and level playing field for a wide range of individuals, small companies, researchers, academics, students, and hobbyists to participate.
  • Create a secure, operational Raspberry Pi IoT sensor
  • Configure and train the sensor using »normal« IoT behavior
  • Establish analytics for detecting aberrant activities
  • Generate real-time alerts to preempt attacks
  • Identify and report data-leakage events originating from IoT devices
  • Develop custom Python applications for cybersecurity

This book is for Cybersecurity specialists, professors teaching in undergraduate and graduate programs in cybersecurity, students in cybersecurity and computer science programs, software developers and engineers developing new cybersecurity defenses, incident response teams, software developers and engineers in general, and hobbyists wanting to expand the application of Raspberry Pi into both IoT and cybersecurity.

Chet Hosmer is the founder of Python Forensics, Inc., a nonprofit organization focused on the collaborative development of open source investigative technologies using the Python programming language. He has been researching and developing technology and training related to forensics, digital investigation, and steganography for over two decades. He has made numerous appearances to discuss emerging cyber threats, including National Public Radio's Kojo Nnamdi show, ABC's Primetime Thursday, NHK Japan, CrimeCrime TechTV, and ABC News Australia. He has been a frequent contributor to technical and news stories relating to cybersecurity and forensics and has been interviewed and quoted by IEEE, The New York Times, The Washington Post, Government Computer News, Salon.com, and Wired Magazine. Chet has authored five books within the cybersecurity domain, ranging from data hiding to forensics. He serves as a visiting professor at Utica College in the cybersecurity graduate program. He is also an adjunct faculty member at Champlain College in the Digital Forensic Science masters program. He delivers keynote and plenary talks on various cybersecurity-related topics around the world each year.

Chapter 1 - Introduction to IoT Vulnerabilities Chapter Goal: Provide a foundation of vulnerabilities and risks associated with IoT devices

* IoT Vulnerabilities

* IoT Data Leakage Risks

* IoT Attack Vectors



Chapter 2 - Classifying and Modeling IoT Behavior

Chapter Goal: To provide a detailed look at how to model IoT devices in both actively and passively.

* Creating an IoT modeling environment

* Probing IoT devices and categorizing the results

* Passively monitoring IoT behaviors and modeling "normal" activity



Chapter 3 - Raspberry Pi as an



IoT Sensor

Chapter Goal: Provide an overview of the Raspberry Pi's strengths and weaknesses as IoT sensor

* Configuring a Raspberry Pi as an IoT Sensor

* Creating a development environment for building Raspberry Pi sensor components

* Defining the key components of the Raspberry Pi IoT Sensor



Chapter 4 - Developing RIPS, the Raspberry Pi IoT Python Sensor

Chapter Goal: Development of the key Python Core Modules in support of RIPS

* Sensor Design

* Software Development

* Code Walk-Through



Chapter 5 - Tra

ining R

IPS

Chapter Goal: Demonstrate the methodology of training RIPS against several IoT devices

* Setting up a training environment

* Modeling the "normal" IoT behavior

* Developing anomaly and aberrant behavior detection models



Chapter 6 - Running RIPS Live

Chapter Goal: Demonstrate RIPS in a Live Environment

* RIPS operation in a steady state "normal" environment

* RIPS operation during IoT reconnaissance activity

* RIPS operating during IoT attack activity

* RIPS operating during IoT data leak activity



/p>Chapter 7 - Future Considerations



Chapter Goal: Provide key insights to the future of both IoT security and the use of distributed RIPS sensors

* Overview of lessons learned as well as the logical next steps

* Provide information relating to the configuration and access to the RIPS source code on GitHub

* Initiate the development of a community surrounding the advancement of RIPS

Erscheinungsdatum
Zusatzinfo 63 Illustrations, color; 7 Illustrations, black and white
Verlagsort Berkley
Sprache englisch
Maße 155 x 235 mm
Gewicht 308 g
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Programmiersprachen / -werkzeuge Python
Informatik Weitere Themen Hardware
Schlagworte Chet Hosmer • cybersecurity • Data Leak Detection • Detection Sensors • Forensics • Internet of Things (IoT) • IoT Attack Vectors • Modelling IoT • Network Monitoring • Python • Python Cybersecurity Applications • Raspberry Pi • Raspberry Pi Sensors
ISBN-10 1-4842-3699-8 / 1484236998
ISBN-13 978-1-4842-3699-4 / 9781484236994
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …

von Norbert Pohlmann

Buch | Softcover (2022)
Springer Vieweg (Verlag)
CHF 48,95