Skip to main content
Erschienen in:
Buchtitelbild

2019 | OriginalPaper | Buchkapitel

Big Data and Internet of Things Security and Forensics: Challenges and Opportunities

verfasst von : Amin Azmoodeh, Ali Dehghantanha, Kim-Kwang Raymond Choo

Erschienen in: Handbook of Big Data and IoT Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With millions to billions of connected Internet of Things (IoT) devices and systems sending heterogeneous raw and processed data through the IoT network, we need to be able to effectively utilize big data analytical techniques and solutions and ensure the security and privacy of IoT data and services against the broad range of attackers. Further complicating the challenge is the increasing number of nodes and complexity of the IoT network and ecosystem, for example the increasing number and size of audit and security logs and intrusion data to be collected and analyzed. The purpose of this handbook is to explore cyber security, forensics and threat intelligence challenges and solutions relating to IoT and big data.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat J. Gubbi, R. Buyya, S. Marusic, M. Palaniswami, Internet of things (IoT): A vision, architectural elements, and future directions, Future generation computer systems 29 (7) (2013) 1645–1660.CrossRef J. Gubbi, R. Buyya, S. Marusic, M. Palaniswami, Internet of things (IoT): A vision, architectural elements, and future directions, Future generation computer systems 29 (7) (2013) 1645–1660.CrossRef
3.
Zurück zum Zitat M. Roopaei, P. Rad, K.-K. R. Choo, Cloud of things in smart agriculture: Intelligent irrigation monitoring by thermal imaging, IEEE Cloud Computing 4 (1) (2017) 10–15.CrossRef M. Roopaei, P. Rad, K.-K. R. Choo, Cloud of things in smart agriculture: Intelligent irrigation monitoring by thermal imaging, IEEE Cloud Computing 4 (1) (2017) 10–15.CrossRef
4.
Zurück zum Zitat S. Walker-Roberts, M. Hammoudeh, A. Dehghantanha, A systematic review of the availability and efficacy of countermeasures to internal threats in healthcare critical infrastructure, IEEE Access 6 (2018) 25167–25177. doi:10.1109/ACCESS.2018.2817560. S. Walker-Roberts, M. Hammoudeh, A. Dehghantanha, A systematic review of the availability and efficacy of countermeasures to internal threats in healthcare critical infrastructure, IEEE Access 6 (2018) 25167–25177. doi:10.​1109/​ACCESS.​2018.​2817560.
5.
Zurück zum Zitat G. Epiphaniou, P. Karadimas, D. K. B. Ismail, H. Al-Khateeb, A. Dehghantanha, K. K. R. Choo, Non-reciprocity compensation combined with turbo codes for secret key generation in vehicular ad hoc social iot networks, IEEE Internet of Things Journal (2017) 1–1. doi:10.1109/JIOT.2017.2764384. G. Epiphaniou, P. Karadimas, D. K. B. Ismail, H. Al-Khateeb, A. Dehghantanha, K. K. R. Choo, Non-reciprocity compensation combined with turbo codes for secret key generation in vehicular ad hoc social iot networks, IEEE Internet of Things Journal (2017) 1–1. doi:10.​1109/​JIOT.​2017.​2764384.
6.
Zurück zum Zitat A. Azmoodeh, A. Dehghantanha, K.-K. R. Choo, Robust malware detection for internet of (battlefield) things devices using deep eigenspace learning, IEEE Transactions on Sustainable Computing. A. Azmoodeh, A. Dehghantanha, K.-K. R. Choo, Robust malware detection for internet of (battlefield) things devices using deep eigenspace learning, IEEE Transactions on Sustainable Computing.
7.
Zurück zum Zitat M. Conti, A. Dehghantanha, K. Franke, S. Watson, Internet of things security and forensics: Challenges and opportunities (2018). M. Conti, A. Dehghantanha, K. Franke, S. Watson, Internet of things security and forensics: Challenges and opportunities (2018).
8.
Zurück zum Zitat Y.-Y. Teing, D. Ali, K. Choo, M. T. Abdullah, Z. Muda, Greening cloud-enabled big data storage forensics: Syncany as a case study, IEEE Transactions on Sustainable Computing. Y.-Y. Teing, D. Ali, K. Choo, M. T. Abdullah, Z. Muda, Greening cloud-enabled big data storage forensics: Syncany as a case study, IEEE Transactions on Sustainable Computing.
9.
Zurück zum Zitat S. Watson, A. Dehghantanha, Digital forensics: the missing piece of the internet of things promise, Computer Fraud & Security 2016 (6) (2016) 5–8.CrossRef S. Watson, A. Dehghantanha, Digital forensics: the missing piece of the internet of things promise, Computer Fraud & Security 2016 (6) (2016) 5–8.CrossRef
10.
Zurück zum Zitat Y.-Y. Teing, A. Dehghantanha, K.-K. R. Choo, L. T. Yang, Forensic investigation of p2p cloud storage services and backbone for iot networks: Bittorrent sync as a case study, Computers & Electrical Engineering 58 (2017) 350–363.CrossRef Y.-Y. Teing, A. Dehghantanha, K.-K. R. Choo, L. T. Yang, Forensic investigation of p2p cloud storage services and backbone for iot networks: Bittorrent sync as a case study, Computers & Electrical Engineering 58 (2017) 350–363.CrossRef
11.
Zurück zum Zitat A. Dehghantanha, M. Conti, T. Dargahi, et al., Cyber threat intelligence, Springer. A. Dehghantanha, M. Conti, T. Dargahi, et al., Cyber threat intelligence, Springer.
12.
Zurück zum Zitat A. Azmoodeh, A. Dehghantanha, M. Conti, K.-K. R. Choo, Detecting crypto-ransomware in iot networks based on energy consumption footprint, Journal of Ambient Intelligence and Humanized Computing 1–12. A. Azmoodeh, A. Dehghantanha, M. Conti, K.-K. R. Choo, Detecting crypto-ransomware in iot networks based on energy consumption footprint, Journal of Ambient Intelligence and Humanized Computing 1–12.
13.
Zurück zum Zitat H. H. Pajouh, R. Javidan, R. Khayami, D. Ali, K.-K. R. Choo, A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in iot backbone networks, IEEE Transactions on Emerging Topics in Computing. H. H. Pajouh, R. Javidan, R. Khayami, D. Ali, K.-K. R. Choo, A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in iot backbone networks, IEEE Transactions on Emerging Topics in Computing.
14.
Zurück zum Zitat S. Sangeetha, G. SudhaSadasivam, Privacy of big data – a review, in: A. Dehghantanha, K.-K. R. Choo (Eds.), Handbook of Big Data and IoT Security, Springer, Cham. S. Sangeetha, G. SudhaSadasivam, Privacy of big data – a review, in: A. Dehghantanha, K.-K. R. Choo (Eds.), Handbook of Big Data and IoT Security, Springer, Cham.
17.
Zurück zum Zitat Y.-Y. Teing, S. Homayoun, A. Dehghantanha, K.-K. R. Choo, R. M. Parizi, M. Hammoudeh, G. Epiphaniou, Private cloud storage forensics: Seafile as a case study, in: A. Dehghantanha, K.-K. R. Choo (Eds.), Handbook of Big Data and IoT Security, Springer, Cham. https://doi.org/10.1007/978-3-030-10543-3. Y.-Y. Teing, S. Homayoun, A. Dehghantanha, K.-K. R. Choo, R. M. Parizi, M. Hammoudeh, G. Epiphaniou, Private cloud storage forensics: Seafile as a case study, in: A. Dehghantanha, K.-K. R. Choo (Eds.), Handbook of Big Data and IoT Security, Springer, Cham. https://​doi.​org/​10.​1007/​978-3-030-10543-3.
18.
Zurück zum Zitat K. Nagrabski, M. Hopkins, M. Petraityte, A. Dehghantanha, R. M. Parizi, G. Epiphaniou, M. Hammoudeh, Distributed filesystem forensics: Ceph as a case study, in: A. Dehghantanha, K.-K. R. Choo (Eds.), Handbook of Big Data and IoT Security, Springer, Cham. https://doi.org/10.1007/978-3-030-10543-3. K. Nagrabski, M. Hopkins, M. Petraityte, A. Dehghantanha, R. M. Parizi, G. Epiphaniou, M. Hammoudeh, Distributed filesystem forensics: Ceph as a case study, in: A. Dehghantanha, K.-K. R. Choo (Eds.), Handbook of Big Data and IoT Security, Springer, Cham. https://​doi.​org/​10.​1007/​978-3-030-10543-3.
19.
Zurück zum Zitat D. P. J. Taylor, H. Mwiki, A. Dehghantanha, A. Akibini, K. K. R. Choo, M. Hammoudeh, R. M. Parizi, Forensic investigation of cross platform massively multiplayer online games: Minecraft as a case study, in: A. Dehghantanha, K.-K. R. Choo (Eds.), Handbook of Big Data and IoT Security, Springer, Cham. https://doi.org/10.1007/978-3-030-10543-3. D. P. J. Taylor, H. Mwiki, A. Dehghantanha, A. Akibini, K. K. R. Choo, M. Hammoudeh, R. M. Parizi, Forensic investigation of cross platform massively multiplayer online games: Minecraft as a case study, in: A. Dehghantanha, K.-K. R. Choo (Eds.), Handbook of Big Data and IoT Security, Springer, Cham. https://​doi.​org/​10.​1007/​978-3-030-10543-3.
20.
Zurück zum Zitat M. Asim, D. R. McKinnel, A. Dehghantanha, R. M. Parizi, M. Hammoudeh, G. Epiphaniou, Big data forensics: Hadoop distributed file systems as a case study, in: A. Dehghantanha, K.-K. R. Choo (Eds.), Handbook of Big Data and IoT Security, Springer, Cham. https://doi.org/10.1007/978-3-030-10543-3. M. Asim, D. R. McKinnel, A. Dehghantanha, R. M. Parizi, M. Hammoudeh, G. Epiphaniou, Big data forensics: Hadoop distributed file systems as a case study, in: A. Dehghantanha, K.-K. R. Choo (Eds.), Handbook of Big Data and IoT Security, Springer, Cham. https://​doi.​org/​10.​1007/​978-3-030-10543-3.
21.
Zurück zum Zitat K. Bolouri, A. Azmoodeh, A. Dehghantanha, M. Firouzmand, Internet of things camera identification algorithm based on sensor pattern noise using color filter array and wavelet transform, in: A. Dehghantanha, K.-K. R. Choo (Eds.), Handbook of Big Data and IoT Security, Springer, Cham. https://doi.org/10.1007/978-3-030-10543-3. K. Bolouri, A. Azmoodeh, A. Dehghantanha, M. Firouzmand, Internet of things camera identification algorithm based on sensor pattern noise using color filter array and wavelet transform, in: A. Dehghantanha, K.-K. R. Choo (Eds.), Handbook of Big Data and IoT Security, Springer, Cham. https://​doi.​org/​10.​1007/​978-3-030-10543-3.
22.
Zurück zum Zitat S. Grooby, T. Dargahi, A. Dehghantanha, Protecting IoT and ICS platforms against advanced persistent threat actors: Analysis of APT1, Silent Chollima and molerats, in: A. Dehghantanha, K.-K. R. Choo (Eds.), Handbook of Big Data and IoT Security, Springer, Cham. https://doi.org/10.1007/978-3-030-10543-3. S. Grooby, T. Dargahi, A. Dehghantanha, Protecting IoT and ICS platforms against advanced persistent threat actors: Analysis of APT1, Silent Chollima and molerats, in: A. Dehghantanha, K.-K. R. Choo (Eds.), Handbook of Big Data and IoT Security, Springer, Cham. https://​doi.​org/​10.​1007/​978-3-030-10543-3.
23.
Zurück zum Zitat P. J. Taylor, T. Dargahi, A. Dehghantanha, Analysis of apt actors targeting IoT and big data systems: Shell_crew,nettraveler, projectsauron, copykittens, volatile cedar and transparent tribe as a case study, in: A. Dehghantanha, K.-K. R. Choo (Eds.), Handbook of Big Data and IoT Security, Springer, Cham. https://doi.org/10.1007/978-3-030-10543-3. P. J. Taylor, T. Dargahi, A. Dehghantanha, Analysis of apt actors targeting IoT and big data systems: Shell_crew,nettraveler, projectsauron, copykittens, volatile cedar and transparent tribe as a case study, in: A. Dehghantanha, K.-K. R. Choo (Eds.), Handbook of Big Data and IoT Security, Springer, Cham. https://​doi.​org/​10.​1007/​978-3-030-10543-3.
24.
25.
Zurück zum Zitat O. M. K. Alhawi, A. Akinbi, A. Dehghantanha, Evaluation and application of two fuzzing approaches for security testing of IoT applications, in: A. Dehghantanha, K.-K. R. Choo (Eds.), Handbook of Big Data and IoT Security, Springer, Cham. https://doi.org/10.1007/978-3-030-10543-3. O. M. K. Alhawi, A. Akinbi, A. Dehghantanha, Evaluation and application of two fuzzing approaches for security testing of IoT applications, in: A. Dehghantanha, K.-K. R. Choo (Eds.), Handbook of Big Data and IoT Security, Springer, Cham. https://​doi.​org/​10.​1007/​978-3-030-10543-3.
28.
Zurück zum Zitat R. M. Parizi, A. Dehghantanha, K.-K. R. Choo, M. Hamoudeh, G. Epiphaniou, Security in online games: Current implementations and challenges, in: A. Dehghantanha, K.-K. R. Choo (Eds.), Handbook of Big Data and IoT Security, Springer, Cham. https://doi.org/10.1007/978-3-030-10543-3. R. M. Parizi, A. Dehghantanha, K.-K. R. Choo, M. Hamoudeh, G. Epiphaniou, Security in online games: Current implementations and challenges, in: A. Dehghantanha, K.-K. R. Choo (Eds.), Handbook of Big Data and IoT Security, Springer, Cham. https://​doi.​org/​10.​1007/​978-3-030-10543-3.
Metadaten
Titel
Big Data and Internet of Things Security and Forensics: Challenges and Opportunities
verfasst von
Amin Azmoodeh
Ali Dehghantanha
Kim-Kwang Raymond Choo
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-10543-3_1