Advertisement

Big Data and Internet of Things Security and Forensics: Challenges and Opportunities

  • Amin Azmoodeh
  • Ali DehghantanhaEmail author
  • Kim-Kwang Raymond Choo
Chapter

Abstract

With millions to billions of connected Internet of Things (IoT) devices and systems sending heterogeneous raw and processed data through the IoT network, we need to be able to effectively utilize big data analytical techniques and solutions and ensure the security and privacy of IoT data and services against the broad range of attackers. Further complicating the challenge is the increasing number of nodes and complexity of the IoT network and ecosystem, for example the increasing number and size of audit and security logs and intrusion data to be collected and analyzed. The purpose of this handbook is to explore cyber security, forensics and threat intelligence challenges and solutions relating to IoT and big data.

Keywords

Big data Internet of Things IoT Security Forensic 

References

  1. 1.
    X. Li, J. Niu, S. Kumari, F. Wu, A. K. Sangaiah, K.-K. R. Choo, A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments, Journal of Network and Computer Applications. doi:https://doi.org/10.1016/j.jnca.2017.07.001.
  2. 2.
    J. Gubbi, R. Buyya, S. Marusic, M. Palaniswami, Internet of things (IoT): A vision, architectural elements, and future directions, Future generation computer systems 29 (7) (2013) 1645–1660.CrossRefGoogle Scholar
  3. 3.
    M. Roopaei, P. Rad, K.-K. R. Choo, Cloud of things in smart agriculture: Intelligent irrigation monitoring by thermal imaging, IEEE Cloud Computing 4 (1) (2017) 10–15.CrossRefGoogle Scholar
  4. 4.
    S. Walker-Roberts, M. Hammoudeh, A. Dehghantanha, A systematic review of the availability and efficacy of countermeasures to internal threats in healthcare critical infrastructure, IEEE Access 6 (2018) 25167–25177. doi:10.1109/ACCESS.2018.2817560.
  5. 5.
    G. Epiphaniou, P. Karadimas, D. K. B. Ismail, H. Al-Khateeb, A. Dehghantanha, K. K. R. Choo, Non-reciprocity compensation combined with turbo codes for secret key generation in vehicular ad hoc social iot networks, IEEE Internet of Things Journal (2017) 1–1. doi:10.1109/JIOT.2017.2764384.
  6. 6.
    A. Azmoodeh, A. Dehghantanha, K.-K. R. Choo, Robust malware detection for internet of (battlefield) things devices using deep eigenspace learning, IEEE Transactions on Sustainable Computing.Google Scholar
  7. 7.
    M. Conti, A. Dehghantanha, K. Franke, S. Watson, Internet of things security and forensics: Challenges and opportunities (2018).Google Scholar
  8. 8.
    Y.-Y. Teing, D. Ali, K. Choo, M. T. Abdullah, Z. Muda, Greening cloud-enabled big data storage forensics: Syncany as a case study, IEEE Transactions on Sustainable Computing.Google Scholar
  9. 9.
    S. Watson, A. Dehghantanha, Digital forensics: the missing piece of the internet of things promise, Computer Fraud & Security 2016 (6) (2016) 5–8.CrossRefGoogle Scholar
  10. 10.
    Y.-Y. Teing, A. Dehghantanha, K.-K. R. Choo, L. T. Yang, Forensic investigation of p2p cloud storage services and backbone for iot networks: Bittorrent sync as a case study, Computers & Electrical Engineering 58 (2017) 350–363.CrossRefGoogle Scholar
  11. 11.
    A. Dehghantanha, M. Conti, T. Dargahi, et al., Cyber threat intelligence, Springer.Google Scholar
  12. 12.
    A. Azmoodeh, A. Dehghantanha, M. Conti, K.-K. R. Choo, Detecting crypto-ransomware in iot networks based on energy consumption footprint, Journal of Ambient Intelligence and Humanized Computing 1–12.Google Scholar
  13. 13.
    H. H. Pajouh, R. Javidan, R. Khayami, D. Ali, K.-K. R. Choo, A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in iot backbone networks, IEEE Transactions on Emerging Topics in Computing.Google Scholar
  14. 14.
    S. Sangeetha, G. SudhaSadasivam, Privacy of big data – a review, in: A. Dehghantanha, K.-K. R. Choo (Eds.), Handbook of Big Data and IoT Security, Springer, Cham.Google Scholar
  15. 15.
    S. Grooby, T. Dargahi, A. Dehghantanha, A bibliometric analysis of authentication and access control in iot devices, in: A. Dehghantanha, K.-K. R. Choo (Eds.), Handbook of Big Data and IoT Security, Springer, Cham. https://doi.org/10.1007/978-3-030-10543-3.
  16. 16.
    M. Heydari, A. Mylonas, V. Katos, D. Gritzalis, Towards indeterminacy-tolerant access control in iot, in: A. Dehghantanha, K.-K. R. Choo (Eds.), Handbook of Big Data and IoT Security, Springer, Cham. https://doi.org/10.1007/978-3-030-10543-3.
  17. 17.
    Y.-Y. Teing, S. Homayoun, A. Dehghantanha, K.-K. R. Choo, R. M. Parizi, M. Hammoudeh, G. Epiphaniou, Private cloud storage forensics: Seafile as a case study, in: A. Dehghantanha, K.-K. R. Choo (Eds.), Handbook of Big Data and IoT Security, Springer, Cham. https://doi.org/10.1007/978-3-030-10543-3.
  18. 18.
    K. Nagrabski, M. Hopkins, M. Petraityte, A. Dehghantanha, R. M. Parizi, G. Epiphaniou, M. Hammoudeh, Distributed filesystem forensics: Ceph as a case study, in: A. Dehghantanha, K.-K. R. Choo (Eds.), Handbook of Big Data and IoT Security, Springer, Cham. https://doi.org/10.1007/978-3-030-10543-3.
  19. 19.
    D. P. J. Taylor, H. Mwiki, A. Dehghantanha, A. Akibini, K. K. R. Choo, M. Hammoudeh, R. M. Parizi, Forensic investigation of cross platform massively multiplayer online games: Minecraft as a case study, in: A. Dehghantanha, K.-K. R. Choo (Eds.), Handbook of Big Data and IoT Security, Springer, Cham. https://doi.org/10.1007/978-3-030-10543-3.
  20. 20.
    M. Asim, D. R. McKinnel, A. Dehghantanha, R. M. Parizi, M. Hammoudeh, G. Epiphaniou, Big data forensics: Hadoop distributed file systems as a case study, in: A. Dehghantanha, K.-K. R. Choo (Eds.), Handbook of Big Data and IoT Security, Springer, Cham. https://doi.org/10.1007/978-3-030-10543-3.
  21. 21.
    K. Bolouri, A. Azmoodeh, A. Dehghantanha, M. Firouzmand, Internet of things camera identification algorithm based on sensor pattern noise using color filter array and wavelet transform, in: A. Dehghantanha, K.-K. R. Choo (Eds.), Handbook of Big Data and IoT Security, Springer, Cham. https://doi.org/10.1007/978-3-030-10543-3.
  22. 22.
    S. Grooby, T. Dargahi, A. Dehghantanha, Protecting IoT and ICS platforms against advanced persistent threat actors: Analysis of APT1, Silent Chollima and molerats, in: A. Dehghantanha, K.-K. R. Choo (Eds.), Handbook of Big Data and IoT Security, Springer, Cham. https://doi.org/10.1007/978-3-030-10543-3.
  23. 23.
    P. J. Taylor, T. Dargahi, A. Dehghantanha, Analysis of apt actors targeting IoT and big data systems: Shell_crew,nettraveler, projectsauron, copykittens, volatile cedar and transparent tribe as a case study, in: A. Dehghantanha, K.-K. R. Choo (Eds.), Handbook of Big Data and IoT Security, Springer, Cham. https://doi.org/10.1007/978-3-030-10543-3.
  24. 24.
    R. HosseiniNejad, H. HaddadPajouh, A. Dehghantanha, R. M. Parizi, A cyber kill chain based analysis of remote access trojans, in: A. Dehghantanha, K.-K. R. Choo (Eds.), Handbook of Big Data and IoT Security, Springer, Cham. https://doi.org/10.1007/978-3-030-10543-3.
  25. 25.
    O. M. K. Alhawi, A. Akinbi, A. Dehghantanha, Evaluation and application of two fuzzing approaches for security testing of IoT applications, in: A. Dehghantanha, K.-K. R. Choo (Eds.), Handbook of Big Data and IoT Security, Springer, Cham. https://doi.org/10.1007/978-3-030-10543-3.
  26. 26.
    L. S. Thiam, T. Dargahi, A. Dehghantanha, Bibliometric analysis on the rise of cloud security, in: A. Dehghantanha, K.-K. R. Choo (Eds.), Handbook of Big Data and IoT Security, Springer, Cham. https://doi.org/10.1007/978-3-030-10543-3.
  27. 27.
    S. Amina, R. Vera, T. Dargahi, A. Dehghantanha, A bibliometric analysis of botnet detection techniques, in: A. Dehghantanha, K.-K. R. Choo (Eds.), Handbook of Big Data and IoT Security, Springer, Cham. https://doi.org/10.1007/978-3-030-10543-3.
  28. 28.
    R. M. Parizi, A. Dehghantanha, K.-K. R. Choo, M. Hamoudeh, G. Epiphaniou, Security in online games: Current implementations and challenges, in: A. Dehghantanha, K.-K. R. Choo (Eds.), Handbook of Big Data and IoT Security, Springer, Cham. https://doi.org/10.1007/978-3-030-10543-3.

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Amin Azmoodeh
    • 1
    • 2
  • Ali Dehghantanha
    • 1
    Email author
  • Kim-Kwang Raymond Choo
    • 3
  1. 1.Cyber Science Lab, School of Computer ScienceUniversity of GuelphGuelphCanada
  2. 2.Department of Computer Science & EngineeringShiraz UniversityShirazIran
  3. 3.Department of Information Systems and Cyber SecurityThe University of Texas at San AntonioTXUSA

Personalised recommendations