Handbook of Big Data and IoT Security

<p>This handbook provides an overarching view&#xa0;of cyber security and digital forensic&#xa0;challenges related to big data and IoT&#xa0;environment, prior to reviewing existing data&#xa0;mining solutions and their potential&#xa0;application in big data context, and existing&#xa0;authentication and access control for IoT&#xa0;devices. An IoT access control scheme and an&#xa0;IoT forensic framework is also presented in&#xa0;this book, and it &#xa0;explains how the&#xa0;IoT forensic framework can be used to guide&#xa0;investigation of a popular cloud storage&#xa0;service.</p> <p>&#xa0;A distributed file system forensic&#xa0;approach is also presented, which is used to&#xa0;guide the investigation of Ceph. Minecraft, a&#xa0;Massively Multiplayer Online Game, and the&#xa0;Hadoop distributed file system environment are&#xa0;also forensically studied and their findings&#xa0;reported in this book. A forensic IoT source&#xa0;camera identification algorithm is&#xa0;introduced, which uses the camera's sensor&#xa0;pattern noise from the captured image.</p> <p>&#xa0;In addition to the IoT access control and&#xa0;forensic frameworks, this handbook covers a&#xa0;cyber defense triage process for nine advanced&#xa0;persistent threat (APT) groups targeting IoT&#xa0;infrastructure, namely: APT1, Molerats, Silent&#xa0;Chollima, Shell Crew, NetTraveler,&#xa0;ProjectSauron, CopyKittens, Volatile Cedar and&#xa0;Transparent Tribe.</p> <p>&#xa0;The characteristics of&#xa0;remote-controlled real-world Trojans using the&#xa0;Cyber Kill Chain are also examined. &#xa0;It introduces a method to leverage different&#xa0;crashes discovered from two fuzzing&#xa0;approaches, which can be used to enhance the&#xa0;effectiveness of fuzzers. Cloud computing is&#xa0;also often associated with IoT and big data&#xa0;(e.g., cloud-enabled IoT systems), and hence a&#xa0;survey of the cloud security literature and a&#xa0;survey of botnet detection approaches are&#xa0;presented in the book. Finally, game security&#xa0;solutions are studied and explained how&#xa0;one may circumvent such solutions.</p> <p>&#xa0;This handbook targets the security, privacy and forensics research community,&#xa0;and big data research community, including policy makers and government agencies,&#xa0;public and private organizations policy makers. Undergraduate and postgraduate&#xa0;students enrolled in cyber security and forensic programs will also find this handbook useful as a reference.</p> <br>

Legimi.pl