Abstract
To automate the collection and analysis of relevant data to infer unsolicited IoT devices and their hosting environments, in near real-time, the automated platform is developed. In this chapter, the core functions, their implementation design, and performance are discussed and evaluated.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
D3 Data-Driven Documents. [Online]. Available: https://d3js.org/. Accessed 2018-03-05.
UCSD Network Telescope – Near-Real-Time Network Telescope Dataset. [Online]. Available: http://www.caida.org/data/passive/telescope-near-real-time_dataset.xml. Accessed 2018-03-05.
MaxMind, Inc. GeoIP2 Databases. [Online]. Available: https://www.maxmind.com/en/geoip2-databases. Accessed 2018-03-05.
ShodanⓇ. Rest API documentation. [Online]. Available: https://developer.shodan.io/api. Accessed 2018-03-05.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Bou-Harb, E., Neshenko, N. (2020). Generating and Sharing IoT-Centric Cyber Threat Intelligence. In: Cyber Threat Intelligence for the Internet of Things. Springer, Cham. https://doi.org/10.1007/978-3-030-45858-4_4
Download citation
DOI: https://doi.org/10.1007/978-3-030-45858-4_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-45857-7
Online ISBN: 978-3-030-45858-4
eBook Packages: Computer ScienceComputer Science (R0)