© Chet Hosmer 2018
Chet HosmerDefending IoT Infrastructures with the Raspberry Pihttps://doi.org/10.1007/978-1-4842-3700-7_2

2. Classifying and Modeling IoT Behavior

Chet Hosmer1 
Longs, South Carolina, USA
In Chapter 1 we took a high-level look at the differences between IoT environments and traditional computing environments. In addition, we examined some of the unique risks and vulnerabilities associated with IoT environments along with the unique discovery and communication protocols that are in use. These characteristics led me to focus on passive mapping and monitoring of IoT behavior. The rationale for this decision includes the following:
  • Many unique devices exist.

  • These devices can be temporal, meaning that they may appear and disappear ...

Get Defending IoT Infrastructures with the Raspberry Pi: Monitoring and Detecting Nefarious Behavior in Real Time now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.