November 2018
Intermediate to advanced
382 pages
11h 20m
English
IoT gateways/brokers should be configured to look for suspicious behavior from the endpoints. As an example, MQTT brokers should capture messages from publishers and subscribers that may signal malicious behavior.
MQTT Specification Version 3.1.1 provides examples of behaviors to report:
Within the AWS IoT suite, one can take advantage of integrated log management features through CloudWatch. CloudWatch can be configured directly within AWS IoT to log process events on messages flowing from devices to the AWS infrastructure.
Message ...