© Chet Hosmer 2018Chet HosmerDefending IoT Infrastructures with the Raspberry Pihttps://doi.org/10.1007/978-1-4842-3700-7_2
2. Classifying and Modeling IoT Behavior
Longs, South Carolina, USA
In Chapter 1
we took a high-level look at the differences between IoT environments and traditional computing environments
. In addition, we examined some of the unique risks and vulnerabilities associated with IoT environments along with the unique discovery and communication protocols that are in use. These characteristics led me to focus on passive mapping and monitoring of IoT behavior. The rationale for this decision includes the following:
Many unique devices exist.
These devices can be temporal, meaning that they may appear and disappear ...