© Chet Hosmer 2018
Chet HosmerDefending IoT Infrastructures with the Raspberry Pihttps://doi.org/10.1007/978-1-4842-3700-7_2

2. Classifying and Modeling IoT Behavior

Chet Hosmer1 
(1)
Longs, South Carolina, USA
 
In Chapter 1 we took a high-level look at the differences between IoT environments and traditional computing environments. In addition, we examined some of the unique risks and vulnerabilities associated with IoT environments along with the unique discovery and communication protocols that are in use. These characteristics led me to focus on passive mapping and monitoring of IoT behavior. The rationale for this decision includes the following:
  • Many unique devices exist.

  • These devices can be temporal, meaning that they may appear and disappear ...

Get Defending IoT Infrastructures with the Raspberry Pi: Monitoring and Detecting Nefarious Behavior in Real Time now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.