Skip to main content

Generating and Sharing IoT-Centric Cyber Threat Intelligence

  • Chapter
  • First Online:
Cyber Threat Intelligence for the Internet of Things

Abstract

To automate the collection and analysis of relevant data to infer unsolicited IoT devices and their hosting environments, in near real-time, the automated platform is developed. In this chapter, the core functions, their implementation design, and performance are discussed and evaluated.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. D3 Data-Driven Documents. [Online]. Available: https://d3js.org/. Accessed 2018-03-05.

  2. UCSD Network Telescope – Near-Real-Time Network Telescope Dataset. [Online]. Available: http://www.caida.org/data/passive/telescope-near-real-time_dataset.xml. Accessed 2018-03-05.

  3. MaxMind, Inc. GeoIP2 Databases. [Online]. Available: https://www.maxmind.com/en/geoip2-databases. Accessed 2018-03-05.

  4. ShodanⓇ. Rest API documentation. [Online]. Available: https://developer.shodan.io/api. Accessed 2018-03-05.

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Bou-Harb, E., Neshenko, N. (2020). Generating and Sharing IoT-Centric Cyber Threat Intelligence. In: Cyber Threat Intelligence for the Internet of Things. Springer, Cham. https://doi.org/10.1007/978-3-030-45858-4_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-45858-4_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-45857-7

  • Online ISBN: 978-3-030-45858-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics