November 2018
Intermediate to advanced
382 pages
11h 20m
English
Guard against compromised IoT devices transmitting large amounts of data to your cloud or gateway infrastructure to take services offline. A classic example of this risk is associated with reflection attacks, where messages are sent to a device that triggers a reply with a large payload (such as NTP amplification).
Instrument your IoT networks to identify increased or abnormal traffic from individual devices, and implement rate-limiting techniques within your service infrastructure.