Cyber threat intelligence for the Internet of Things /

Saved in:
Bibliographic Details
Author / Creator:Bou-Harb, Elias.
Imprint:Cham : Springer, 2020.
Description:1 online resource (98 p.)
Language:English
Subject:
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/12605615
Hidden Bibliographic Details
Other authors / contributors:Neshenko, Nataliia.
ISBN:9783030458584
303045858X
3030458571
9783030458577
Notes:Description based upon print version of record.
Includes bibliographical references.
Summary:This book reviews IoT-centric vulnerabilities from a multidimensional perspective by elaborating on IoT attack vectors, their impacts on well-known security objectives, attacks which exploit such vulnerabilities, coupled with their corresponding remediation methodologies. This book further highlights the severity of the IoT problem at large, through disclosing incidents of Internet-scale IoT exploitations, while putting forward a preliminary prototype and associated results to aid in the IoT mitigation objective. Moreover, this book summarizes and discloses findings, inferences, and open challenges to inspire future research addressing theoretical and empirical aspects related to the imperative topic of IoT security. At least 20 billion devices will be connected to the Internet in the next few years. Many of these devices transmit critical and sensitive system and personal data in real-time. Collectively known as "the Internet of Things" (IoT), this market represents a $267 billion per year industry. As valuable as this market is, security spending on the sector barely breaks 1%. Indeed, while IoT vendors continue to push more IoT devices to market, the security of these devices has often fallen in priority, making them easier to exploit. This drastically threatens the privacy of the consumers and the safety of mission-critical systems. This book is intended for cybersecurity researchers and advanced-level students in computer science. Developers and operators working in this field, who are eager to comprehend the vulnerabilities of the Internet of Things (IoT) paradigm and understand the severity of accompanied security issues will also be interested in this book.
Other form:Print version: Bou-Harb, Elias Cyber Threat Intelligence for the Internet of Things Cham : Springer,c2020 9783030458577
Standard no.:10.1007/978-3-030-45

MARC

LEADER 00000cam a2200000Ia 4500
001 12605615
005 20210813213023.0
006 m d
007 cr un|---aucuu
008 200606s2020 sz ob 000 0 eng d
019 |a 1156613397  |a 1162188228  |a 1163821458  |a 1164672818  |a 1175698005  |a 1182533140  |a 1183411297 
020 |a 9783030458584  |q (electronic bk.) 
020 |a 303045858X  |q (electronic bk.) 
020 |z 3030458571 
020 |z 9783030458577 
024 7 |a 10.1007/978-3-030-45 
035 |a (OCoLC)1157080382  |z (OCoLC)1156613397  |z (OCoLC)1162188228  |z (OCoLC)1163821458  |z (OCoLC)1164672818  |z (OCoLC)1175698005  |z (OCoLC)1182533140  |z (OCoLC)1183411297 
035 9 |a (OCLCCM-CC)1157080382 
040 |a EBLCP  |b eng  |c EBLCP  |d YDX  |d EBLCP  |d GW5XE  |d LQU  |d N$T  |d OCLCF  |d AUD  |d UKAHL 
049 |a MAIN 
050 4 |a TK5105.8857 
100 1 |a Bou-Harb, Elias. 
245 1 0 |a Cyber threat intelligence for the Internet of Things /  |c Elias Bou-Harb, Nataliia Neshenko. 
260 |a Cham :  |b Springer,  |c 2020. 
300 |a 1 online resource (98 p.) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references. 
500 |a Description based upon print version of record. 
505 0 |a Introduction -- Taxonomy of IoT Vulnerabilities -- Towards Inferring IoT Maliciousness -- Generating and sharing IoT-centric Cyber Threat Intelligence -- Concluding Remarks and Future Perspective.-. 
520 |a This book reviews IoT-centric vulnerabilities from a multidimensional perspective by elaborating on IoT attack vectors, their impacts on well-known security objectives, attacks which exploit such vulnerabilities, coupled with their corresponding remediation methodologies. This book further highlights the severity of the IoT problem at large, through disclosing incidents of Internet-scale IoT exploitations, while putting forward a preliminary prototype and associated results to aid in the IoT mitigation objective. Moreover, this book summarizes and discloses findings, inferences, and open challenges to inspire future research addressing theoretical and empirical aspects related to the imperative topic of IoT security. At least 20 billion devices will be connected to the Internet in the next few years. Many of these devices transmit critical and sensitive system and personal data in real-time. Collectively known as "the Internet of Things" (IoT), this market represents a $267 billion per year industry. As valuable as this market is, security spending on the sector barely breaks 1%. Indeed, while IoT vendors continue to push more IoT devices to market, the security of these devices has often fallen in priority, making them easier to exploit. This drastically threatens the privacy of the consumers and the safety of mission-critical systems. This book is intended for cybersecurity researchers and advanced-level students in computer science. Developers and operators working in this field, who are eager to comprehend the vulnerabilities of the Internet of Things (IoT) paradigm and understand the severity of accompanied security issues will also be interested in this book. 
650 0 |a Internet of things  |x Security measures. 
650 7 |a Application software.  |2 fast  |0 (OCoLC)fst00811706 
650 7 |a Artificial intelligence.  |2 fast  |0 (OCoLC)fst00817247 
650 7 |a Computer networks.  |2 fast  |0 (OCoLC)fst00872297 
650 7 |a Data protection.  |2 fast  |0 (OCoLC)fst00887958 
655 0 |a Electronic books. 
655 4 |a Electronic books. 
700 1 |a Neshenko, Nataliia. 
776 0 8 |i Print version:  |a Bou-Harb, Elias  |t Cyber Threat Intelligence for the Internet of Things  |d Cham : Springer,c2020  |z 9783030458577 
903 |a HeVa 
929 |a oclccm 
999 f f |i 249cae50-2cf3-53ba-84de-4b5d5f5b2138  |s 1d2088bd-6130-5755-bdf0-a105deb8cca2 
928 |t Library of Congress classification  |a TK5105.8857  |l Online  |c UC-FullText  |u https://link.springer.com/10.1007/978-3-030-45858-4  |z Springer Nature  |g ebooks  |i 12621223