Defending IoT Infrastructures with the Raspberry Pi : Monitoring and Detecting Nefarious Behavior in Real Time / Chet Hosmer.
Publication details: Berkeley, CA : Apress : c2018.Edition: 1st editionDescription: XV, 178 p. : ill. ; 24ISBN:- 9781484237007
- 004.678 23 HOS
Item type | Current library | Call number | Copy number | Status | Date due | Barcode |
---|---|---|---|---|---|---|
Book Closed Access | Engineering Library | 004.678 HOS 1 (Browse shelf(Opens below)) | 1 | Available | BUML24010366 |
CONTENTS
Chapter 1: IoT Vulnerabilities
Device-to-device communication
Device-cloud-communication
Device-to-gate way sensor network communications
Chapter 2: Classifying and Modeling IoT Behavior
What should we collect?
Ethernet packet format
ARP
Chapter 3: Raspberry Pi Configuration and PackerRecorder.py Enhancements
Basic configuration(as of this writing)
Get information about the PI CPU
Get information regarding Pi memory
Chapter 4: Raspberry Pi as a Sensor
Turning packet recorder into a sensor
Raspberry Pi sensor recorder design
Chapter 5: Operating the Raspberry Pi Sensor
Raspberry Pi setup
Connecting the Raspberry Pi
Switch configuration for packet capture
Chapter 6: Adding Finishing Touches
Raspberry Pi latest version
Sensor software updates
Chapter 7: Future Considerations
Expansion of lookup tables
Implementation of user searches and filtering of scan result
Headless communication with remotely deployed pi sensors
Appendix: Obtaining the Python Source Code --
Glossary
Includes Index p. 175-178
Description based on publisher-supplied MARC data.
There are no comments on this title.