Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Hands-On Edge Analytics with Azure IoT

You're reading from   Hands-On Edge Analytics with Azure IoT Design and develop IoT applications with edge analytical solutions including Azure IoT Edge

Arrow left icon
Product type Paperback
Published in May 2020
Publisher Packt
ISBN-13 9781838829902
Length 262 pages
Edition 1st Edition
Tools
Concepts
Arrow right icon
Author (1):
Arrow left icon
Colin Dow Colin Dow
Author Profile Icon Colin Dow
Colin Dow
Arrow right icon
View More author details
Toc

Table of Contents (15) Chapters Close

Preface 1. Section 1: Getting Started with Edge Analytics
2. Introduction to Edge Analytics FREE CHAPTER 3. How Does IoT Edge Analytics Work? 4. Communications Protocols Used in Edge Analytics 5. Section 2: Understanding Edge Analytics Technologies
6. Working with Microsoft Azure IoT Hub 7. Using the Raspberry Pi with Azure IoT Edge 8. Using MicroPython for Edge Analytics 9. Machine Learning and Edge Analytics 10. Designing a Smart Doorbell with Visual Recognition 11. Section 3: The Road Ahead
12. Security and Privacy in an Edge Analytics World 13. What Next? 14. Other Books You May Enjoy

An overview of the Internet-of-Things security

Starting in September 2016, the Mirai botnet launched a distributed denial of service (DDoS) attack using the Internet of Things (IoT) devices on some of the biggest websites in the world, including Reddit, Airbnb, and Netflix. Flooding the DNS provider of these websites with more than 1 TB of data per second from captured devices, the cyber attack was one of the biggest DDoS attacks ever recorded.

So, what exactly is a DDoS attack and how are IoT devices involved? The following diagram shows what a DDoS attack with IoT devices might look like:

DDoS is an attack on a website that overwhelms it with excessive traffic, causing the website to fail. This type of attack is beneficial to the website's competitors. In the case of the Mirai botnet, the attack was designed by students interested in disabling competing Minecraft servers...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image