๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Handbook of Big Data and IoT Security

โœ Scribed by Ali Dehghantanha, Kim-Kwang Raymond Choo


Publisher
Springer International Publishing
Year
2019
Tongue
English
Leaves
382
Edition
1st ed.
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


This handbook provides an overarching view of cyber security and digital forensic challenges related to big data and IoT environment, prior to reviewing existing data mining solutions and their potential application in big data context, and existing authentication and access control for IoT devices. An IoT access control scheme and an IoT forensic framework is also presented in this book, and it explains how the IoT forensic framework can be used to guide investigation of a popular cloud storage service.

A distributed file system forensic approach is also presented, which is used to guide the investigation of Ceph. Minecraft, a Massively Multiplayer Online Game, and the Hadoop distributed file system environment are also forensically studied and their findings reported in this book. A forensic IoT source camera identification algorithm is introduced, which uses the camera's sensor pattern noise from the captured image.

In addition to the IoT access control and forensic frameworks, this handbook covers a cyber defense triage process for nine advanced persistent threat (APT) groups targeting IoT infrastructure, namely: APT1, Molerats, Silent Chollima, Shell Crew, NetTraveler, ProjectSauron, CopyKittens, Volatile Cedar and Transparent Tribe.

The characteristics of remote-controlled real-world Trojans using the Cyber Kill Chain are also examined. It introduces a method to leverage different crashes discovered from two fuzzing approaches, which can be used to enhance the effectiveness of fuzzers. Cloud computing is also often associated with IoT and big data (e.g., cloud-enabled IoT systems), and hence a survey of the cloud security literature and a survey of botnet detection approaches are presented in the book. Finally, game security solutions are studied and explained how one may circumvent such solutions.

This handbook targets the security, privacy and forensics research community, and big data research community, including policy makers and government agencies, public and private organizations policy makers. Undergraduate and postgraduate students enrolled in cyber security and forensic programs will also find this handbook useful as a reference.


โœฆ Table of Contents


Front Matter ....Pages i-ix
Big Data and Internet of Things Security and Forensics: Challenges and Opportunities (Amin Azmoodeh, Ali Dehghantanha, Kim-Kwang Raymond Choo)....Pages 1-4
Privacy of Big Data: A Review (S. Sangeetha, G. Sudha Sadasivam)....Pages 5-23
A Bibliometric Analysis of Authentication and Access Control in IoT Devices (Samuel Grooby, Tooska Dargahi, Ali Dehghantanha)....Pages 25-51
Towards Indeterminacy-Tolerant Access Control in IoT (Mohammad Heydari, Alexios Mylonas, Vasileios Katos, Dimitris Gritzalis)....Pages 53-71
Private Cloud Storage Forensics: Seafile as a Case Study (Yee-Yang Teing, Sajad Homayoun, Ali Dehghantanha, Kim-Kwang Raymond Choo, Reza M. Parizi, Mohammad Hammoudeh et al.)....Pages 73-127
Distributed Filesystem Forensics: Ceph as a Case Study (Krzysztof Nagrabski, Michael Hopkins, Milda Petraityte, Ali Dehghantanha, Reza M. Parizi, Gregory Epiphaniou et al.)....Pages 129-151
Forensic Investigation of Cross Platform Massively Multiplayer Online Games: Minecraft as a Case Study (Paul J. Taylor, Henry Mwiki, Ali Dehghantanha, Alex Akinbi, Kim-Kwang Raymond Choo, Mohammad Hammoudeh et al.)....Pages 153-177
Big Data Forensics: Hadoop Distributed File Systems as a Case Study (Mohammed Asim, Dean Richard McKinnel, Ali Dehghantanha, Reza M. Parizi, Mohammad Hammoudeh, Gregory Epiphaniou)....Pages 179-210
Internet of Things Camera Identification Algorithm Based on Sensor Pattern Noise Using Color Filter Array and Wavelet Transform (Kimia Bolouri, Amin Azmoodeh, Ali Dehghantanha, Mohammad Firouzmand)....Pages 211-223
Protecting IoT and ICS Platforms Against Advanced Persistent Threat Actors: Analysis of APT1, Silent Chollima and Molerats (Samuel Grooby, Tooska Dargahi, Ali Dehghantanha)....Pages 225-255
Analysis of APT Actors Targeting IoT and Big Data Systems: Shell_Crew, NetTraveler, ProjectSauron, CopyKittens, Volatile Cedar and Transparent Tribe as a Case Study (Paul J. Taylor, Tooska Dargahi, Ali Dehghantanha)....Pages 257-272
A Cyber Kill Chain Based Analysis of Remote Access Trojans (Reyhaneh HosseiniNejad, Hamed HaddadPajouh, Ali Dehghantanha, Reza M. Parizi)....Pages 273-299
Evaluation and Application of Two Fuzzing Approaches for Security Testing of IoT Applications (Omar M. K. Alhawi, Alex Akinbi, Ali Dehghantanha)....Pages 301-327
Bibliometric Analysis on the Rise of Cloud Security (Lim Sze Thiam, Tooska Dargahi, Ali Dehghantanha)....Pages 329-344
A Bibliometric Analysis of Botnet Detection Techniques (Shehu Amina, Raul Vera, Tooska Dargahi, Ali Dehghantanha)....Pages 345-365
Security in Online Games: Current Implementations and Challenges (Reza M. Parizi, Ali Dehghantanha, Kim-Kwang Raymond Choo, Mohammad Hammoudeh, Gregory Epiphaniou)....Pages 367-384

โœฆ Subjects


Computer Science; Security; Information Systems and Communication Service


๐Ÿ“œ SIMILAR VOLUMES


Securing IoT and Big Data: Next Generati
โœ Vijayalakshmi Saravanan, Alagan Anpalagan, T. Poongodi, Firoz Khan ๐Ÿ“‚ Library ๐Ÿ“… 2021 ๐Ÿ› CRC Press ๐ŸŒ English

This book covers IoT and Big Data from a technical and business point of view. The book explains the design principles, algorithms, technical knowledge, and marketing for IoT systems.ใ€€ It emphasizes applications of big data and IoT. It includes scientific algorithms and key techniques for fusion

Handbook of Big Data Analytics, Volume 2
โœ Vadlamani Ravi, Aswani Kumar Cherukuri ๐Ÿ“‚ Library ๐Ÿ“… 2021 ๐Ÿ› Institution of Engineering and Technology ๐ŸŒ English

<p><span>Big Data analytics is the complex process of examining big data to uncover information such as correlations, hidden patterns, trends and user and customer preferences, to allow organizations and businesses to make more informed decisions. These methods and technologies have become ubiquitou

Handbook of Big Data Analytics: Applicat
โœ Vadlamani Ravi (editor), Aswani Kumar Cherukuri (editor) ๐Ÿ“‚ Library ๐Ÿ“… 2021 ๐Ÿ› The Institution of Engineering and Technology ๐ŸŒ English

<p>Big Data analytics is the complex process of examining big data to uncover information such as correlations, hidden patterns, trends and user and customer preferences, to allow organizations and businesses to make more informed decisions. These methods and technologies have become ubiquitous in a

Authentication Technologies for Cloud Co
โœ Yasser M. Alginahi (editor), Muhammad Nomani Kabir (editor) ๐Ÿ“‚ Library ๐Ÿ“… 2019 ๐Ÿ› INSTITUTION OF ENGINEERING & T ๐ŸŒ English

<p>Critical systems and infrastructure rely heavily on ICT systems and networks where security issues are a major concern. Authentication methods verify that messages come from trusted sources and guarantee the smooth flow of information and data. In this edited reference, the authors present state-

Handbook of Big Data Analytics: Applicat
โœ Vadlamani Ravi (editor), Aswani Kumar Cherukuri (editor) ๐Ÿ“‚ Library ๐Ÿ“… 2021 ๐Ÿ› Institution of Engineering and Technology ๐ŸŒ English

<p>Big Data analytics is the complex process of examining big data to uncover information such as correlations, hidden patterns, trends and user and customer preferences, to allow organizations and businesses to make more informed decisions. These methods and technologies have become ubiquitous in a

Handbook of Research on Cloud Computing
โœ B B Gupta; Dharma P Agrawal ๐Ÿ“‚ Library ๐Ÿ“… 2019 ๐Ÿ› Engineering Science Reference ๐ŸŒ English

Today, cloud computing, big data, and the internet of things (IoT) are becoming indubitable parts of modern information and communication systems. They cover not only information and communication technology but also all types of systems in society including within the realms of business, finance, i