Chapter 10. Threat Defense

Topics covered in this chapter include

   Network Address Translation (NAT)

   Packet Filtering Techniques and Inherent Problems with Industrial Communication Protocols

   Application Visibility and Control

   IDS/IPS Technology

   Behavior Analysis

   Encrypted Traffic Analytics

   Malware Protection

   Malicious Domain Protection (DNS-Based Security)

   Use Case Examples of Centralized and Distributed VNF Placement

The previous chapter focused on technologies to identify endpoints, provide adaptable authentication mechanisms to ensure that an endpoint is what it claims to be, and then provide the appropriate level of access privileges based on its identity. That technology is engaged before the endpoint ...

Get Orchestrating and Automating Security for the Internet of Things: Delivering Advanced Security Capabilities from Edge to Cloud for IoT now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.