Abstract
With millions to billions of connected Internet of Things (IoT) devices and systems sending heterogeneous raw and processed data through the IoT network, we need to be able to effectively utilize big data analytical techniques and solutions and ensure the security and privacy of IoT data and services against the broad range of attackers. Further complicating the challenge is the increasing number of nodes and complexity of the IoT network and ecosystem, for example the increasing number and size of audit and security logs and intrusion data to be collected and analyzed. The purpose of this handbook is to explore cyber security, forensics and threat intelligence challenges and solutions relating to IoT and big data.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
X. Li, J. Niu, S. Kumari, F. Wu, A. K. Sangaiah, K.-K. R. Choo, A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments, Journal of Network and Computer Applications. doi:https://doi.org/10.1016/j.jnca.2017.07.001.
J. Gubbi, R. Buyya, S. Marusic, M. Palaniswami, Internet of things (IoT): A vision, architectural elements, and future directions, Future generation computer systems 29 (7) (2013) 1645–1660.
M. Roopaei, P. Rad, K.-K. R. Choo, Cloud of things in smart agriculture: Intelligent irrigation monitoring by thermal imaging, IEEE Cloud Computing 4 (1) (2017) 10–15.
S. Walker-Roberts, M. Hammoudeh, A. Dehghantanha, A systematic review of the availability and efficacy of countermeasures to internal threats in healthcare critical infrastructure, IEEE Access 6 (2018) 25167–25177. doi:10.1109/ACCESS.2018.2817560.
G. Epiphaniou, P. Karadimas, D. K. B. Ismail, H. Al-Khateeb, A. Dehghantanha, K. K. R. Choo, Non-reciprocity compensation combined with turbo codes for secret key generation in vehicular ad hoc social iot networks, IEEE Internet of Things Journal (2017) 1–1. doi:10.1109/JIOT.2017.2764384.
A. Azmoodeh, A. Dehghantanha, K.-K. R. Choo, Robust malware detection for internet of (battlefield) things devices using deep eigenspace learning, IEEE Transactions on Sustainable Computing.
M. Conti, A. Dehghantanha, K. Franke, S. Watson, Internet of things security and forensics: Challenges and opportunities (2018).
Y.-Y. Teing, D. Ali, K. Choo, M. T. Abdullah, Z. Muda, Greening cloud-enabled big data storage forensics: Syncany as a case study, IEEE Transactions on Sustainable Computing.
S. Watson, A. Dehghantanha, Digital forensics: the missing piece of the internet of things promise, Computer Fraud & Security 2016 (6) (2016) 5–8.
Y.-Y. Teing, A. Dehghantanha, K.-K. R. Choo, L. T. Yang, Forensic investigation of p2p cloud storage services and backbone for iot networks: Bittorrent sync as a case study, Computers & Electrical Engineering 58 (2017) 350–363.
A. Dehghantanha, M. Conti, T. Dargahi, et al., Cyber threat intelligence, Springer.
A. Azmoodeh, A. Dehghantanha, M. Conti, K.-K. R. Choo, Detecting crypto-ransomware in iot networks based on energy consumption footprint, Journal of Ambient Intelligence and Humanized Computing 1–12.
H. H. Pajouh, R. Javidan, R. Khayami, D. Ali, K.-K. R. Choo, A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in iot backbone networks, IEEE Transactions on Emerging Topics in Computing.
S. Sangeetha, G. SudhaSadasivam, Privacy of big data – a review, in: A. Dehghantanha, K.-K. R. Choo (Eds.), Handbook of Big Data and IoT Security, Springer, Cham.
S. Grooby, T. Dargahi, A. Dehghantanha, A bibliometric analysis of authentication and access control in iot devices, in: A. Dehghantanha, K.-K. R. Choo (Eds.), Handbook of Big Data and IoT Security, Springer, Cham. https://doi.org/10.1007/978-3-030-10543-3.
M. Heydari, A. Mylonas, V. Katos, D. Gritzalis, Towards indeterminacy-tolerant access control in iot, in: A. Dehghantanha, K.-K. R. Choo (Eds.), Handbook of Big Data and IoT Security, Springer, Cham. https://doi.org/10.1007/978-3-030-10543-3.
Y.-Y. Teing, S. Homayoun, A. Dehghantanha, K.-K. R. Choo, R. M. Parizi, M. Hammoudeh, G. Epiphaniou, Private cloud storage forensics: Seafile as a case study, in: A. Dehghantanha, K.-K. R. Choo (Eds.), Handbook of Big Data and IoT Security, Springer, Cham. https://doi.org/10.1007/978-3-030-10543-3.
K. Nagrabski, M. Hopkins, M. Petraityte, A. Dehghantanha, R. M. Parizi, G. Epiphaniou, M. Hammoudeh, Distributed filesystem forensics: Ceph as a case study, in: A. Dehghantanha, K.-K. R. Choo (Eds.), Handbook of Big Data and IoT Security, Springer, Cham. https://doi.org/10.1007/978-3-030-10543-3.
D. P. J. Taylor, H. Mwiki, A. Dehghantanha, A. Akibini, K. K. R. Choo, M. Hammoudeh, R. M. Parizi, Forensic investigation of cross platform massively multiplayer online games: Minecraft as a case study, in: A. Dehghantanha, K.-K. R. Choo (Eds.), Handbook of Big Data and IoT Security, Springer, Cham. https://doi.org/10.1007/978-3-030-10543-3.
M. Asim, D. R. McKinnel, A. Dehghantanha, R. M. Parizi, M. Hammoudeh, G. Epiphaniou, Big data forensics: Hadoop distributed file systems as a case study, in: A. Dehghantanha, K.-K. R. Choo (Eds.), Handbook of Big Data and IoT Security, Springer, Cham. https://doi.org/10.1007/978-3-030-10543-3.
K. Bolouri, A. Azmoodeh, A. Dehghantanha, M. Firouzmand, Internet of things camera identification algorithm based on sensor pattern noise using color filter array and wavelet transform, in: A. Dehghantanha, K.-K. R. Choo (Eds.), Handbook of Big Data and IoT Security, Springer, Cham. https://doi.org/10.1007/978-3-030-10543-3.
S. Grooby, T. Dargahi, A. Dehghantanha, Protecting IoT and ICS platforms against advanced persistent threat actors: Analysis of APT1, Silent Chollima and molerats, in: A. Dehghantanha, K.-K. R. Choo (Eds.), Handbook of Big Data and IoT Security, Springer, Cham. https://doi.org/10.1007/978-3-030-10543-3.
P. J. Taylor, T. Dargahi, A. Dehghantanha, Analysis of apt actors targeting IoT and big data systems: Shell_crew,nettraveler, projectsauron, copykittens, volatile cedar and transparent tribe as a case study, in: A. Dehghantanha, K.-K. R. Choo (Eds.), Handbook of Big Data and IoT Security, Springer, Cham. https://doi.org/10.1007/978-3-030-10543-3.
R. HosseiniNejad, H. HaddadPajouh, A. Dehghantanha, R. M. Parizi, A cyber kill chain based analysis of remote access trojans, in: A. Dehghantanha, K.-K. R. Choo (Eds.), Handbook of Big Data and IoT Security, Springer, Cham. https://doi.org/10.1007/978-3-030-10543-3.
O. M. K. Alhawi, A. Akinbi, A. Dehghantanha, Evaluation and application of two fuzzing approaches for security testing of IoT applications, in: A. Dehghantanha, K.-K. R. Choo (Eds.), Handbook of Big Data and IoT Security, Springer, Cham. https://doi.org/10.1007/978-3-030-10543-3.
L. S. Thiam, T. Dargahi, A. Dehghantanha, Bibliometric analysis on the rise of cloud security, in: A. Dehghantanha, K.-K. R. Choo (Eds.), Handbook of Big Data and IoT Security, Springer, Cham. https://doi.org/10.1007/978-3-030-10543-3.
S. Amina, R. Vera, T. Dargahi, A. Dehghantanha, A bibliometric analysis of botnet detection techniques, in: A. Dehghantanha, K.-K. R. Choo (Eds.), Handbook of Big Data and IoT Security, Springer, Cham. https://doi.org/10.1007/978-3-030-10543-3.
R. M. Parizi, A. Dehghantanha, K.-K. R. Choo, M. Hamoudeh, G. Epiphaniou, Security in online games: Current implementations and challenges, in: A. Dehghantanha, K.-K. R. Choo (Eds.), Handbook of Big Data and IoT Security, Springer, Cham. https://doi.org/10.1007/978-3-030-10543-3.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Azmoodeh, A., Dehghantanha, A., Choo, KK.R. (2019). Big Data and Internet of Things Security and Forensics: Challenges and Opportunities. In: Dehghantanha, A., Choo, KK. (eds) Handbook of Big Data and IoT Security. Springer, Cham. https://doi.org/10.1007/978-3-030-10543-3_1
Download citation
DOI: https://doi.org/10.1007/978-3-030-10543-3_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-10542-6
Online ISBN: 978-3-030-10543-3
eBook Packages: Computer ScienceComputer Science (R0)