Advertisement

Handbook of Big Data and IoT Security

  • Ali Dehghantanha
  • Kim-Kwang Raymond Choo

Table of contents

  1. Front Matter
    Pages i-ix
  2. Amin Azmoodeh, Ali Dehghantanha, Kim-Kwang Raymond Choo
    Pages 1-4
  3. S. Sangeetha, G. Sudha Sadasivam
    Pages 5-23
  4. Samuel Grooby, Tooska Dargahi, Ali Dehghantanha
    Pages 25-51
  5. Mohammad Heydari, Alexios Mylonas, Vasileios Katos, Dimitris Gritzalis
    Pages 53-71
  6. Yee-Yang Teing, Sajad Homayoun, Ali Dehghantanha, Kim-Kwang Raymond Choo, Reza M. Parizi, Mohammad Hammoudeh et al.
    Pages 73-127
  7. Krzysztof Nagrabski, Michael Hopkins, Milda Petraityte, Ali Dehghantanha, Reza M. Parizi, Gregory Epiphaniou et al.
    Pages 129-151
  8. Paul J. Taylor, Henry Mwiki, Ali Dehghantanha, Alex Akinbi, Kim-Kwang Raymond Choo, Mohammad Hammoudeh et al.
    Pages 153-177
  9. Mohammed Asim, Dean Richard McKinnel, Ali Dehghantanha, Reza M. Parizi, Mohammad Hammoudeh, Gregory Epiphaniou
    Pages 179-210
  10. Reyhaneh HosseiniNejad, Hamed HaddadPajouh, Ali Dehghantanha, Reza M. Parizi
    Pages 273-299
  11. Omar M. K. Alhawi, Alex Akinbi, Ali Dehghantanha
    Pages 301-327
  12. Lim Sze Thiam, Tooska Dargahi, Ali Dehghantanha
    Pages 329-344
  13. Shehu Amina, Raul Vera, Tooska Dargahi, Ali Dehghantanha
    Pages 345-365
  14. Reza M. Parizi, Ali Dehghantanha, Kim-Kwang Raymond Choo, Mohammad Hammoudeh, Gregory Epiphaniou
    Pages 367-384

About this book

Introduction

This handbook provides an overarching view of cyber security and digital forensic challenges related to big data and IoT environment, prior to reviewing existing data mining solutions and their potential application in big data context, and existing authentication and access control for IoT devices. An IoT access control scheme and an IoT forensic framework is also presented in this book, and it  explains how the IoT forensic framework can be used to guide investigation of a popular cloud storage service.

 A distributed file system forensic approach is also presented, which is used to guide the investigation of Ceph. Minecraft, a Massively Multiplayer Online Game, and the Hadoop distributed file system environment are also forensically studied and their findings reported in this book. A forensic IoT source camera identification algorithm is introduced, which uses the camera's sensor pattern noise from the captured image.

 In addition to the IoT access control and forensic frameworks, this handbook covers a cyber defense triage process for nine advanced persistent threat (APT) groups targeting IoT infrastructure, namely: APT1, Molerats, Silent Chollima, Shell Crew, NetTraveler, ProjectSauron, CopyKittens, Volatile Cedar and Transparent Tribe.

 The characteristics of remote-controlled real-world Trojans using the Cyber Kill Chain are also examined.  It introduces a method to leverage different crashes discovered from two fuzzing approaches, which can be used to enhance the effectiveness of fuzzers. Cloud computing is also often associated with IoT and big data (e.g., cloud-enabled IoT systems), and hence a survey of the cloud security literature and a survey of botnet detection approaches are presented in the book. Finally, game security solutions are studied and explained how one may circumvent such solutions.

 This handbook targets the security, privacy and forensics research community, and big data research community, including policy makers and government agencies, public and private organizations policy makers. Undergraduate and postgraduate students enrolled in cyber security and forensic programs will also find this handbook useful as a reference.


Keywords

big data security IoT security cyber threat intelligence cyber threat hunting cyber security digital forensics Internet of Things Big Data cyber threat analytics distributed systems security cyber kill change IoT Forensics

Editors and affiliations

  • Ali Dehghantanha
    • 1
  • Kim-Kwang Raymond Choo
    • 2
  1. 1.Cyber Science Lab, School of Computer ScienceUniversity of GuelphGuelphCanada
  2. 2.Department of Information Systems and Cyber SecurityThe University of Texas at San AntonioSan AntonioUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-030-10543-3
  • Copyright Information Springer Nature Switzerland AG 2019
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-030-10542-6
  • Online ISBN 978-3-030-10543-3
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Chemical Manufacturing
Biotechnology
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Consumer Packaged Goods
Energy, Utilities & Environment
Aerospace
Engineering