- Gebundenes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
The book Anatomy of IoT Botnets and Detection Methods delves into the evolving landscape of cybersecurity threats associated with the Internet of Things (IoT), specifically focusing on the anatomy, behavior, and detection of IoT-based botnets.
Andere Kunden interessierten sich auch für
Sumit KalariaSecuring Android Apps132,99 €
Carl FriedlaenderA Manual of Microscopical Technology for Use in the Investigations of Medicine and Pathological Anatomy31,99 €
Hedi NasheriEmerging Technologies, Novel Crimes, and Security170,99 €
Securing IoT and Big Data167,99 €
Hans-J. LenzManipulationen und Moneten - Datentrickserei im digitalen Zeitalter27,99 €
Uwe IrmerSchnelleinstieg in die Informationssicherheit29,99 €
Uwe IrmerCloud Security25,99 €-
-
-
The book Anatomy of IoT Botnets and Detection Methods delves into the evolving landscape of cybersecurity threats associated with the Internet of Things (IoT), specifically focusing on the anatomy, behavior, and detection of IoT-based botnets.
Produktdetails
- Produktdetails
- Verlag: CRC Press
- Seitenzahl: 230
- Erscheinungstermin: 12. November 2025
- Englisch
- Abmessung: 240mm x 161mm x 17mm
- Gewicht: 514g
- ISBN-13: 9781041050223
- ISBN-10: 1041050224
- Artikelnr.: 74446889
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
- Verlag: CRC Press
- Seitenzahl: 230
- Erscheinungstermin: 12. November 2025
- Englisch
- Abmessung: 240mm x 161mm x 17mm
- Gewicht: 514g
- ISBN-13: 9781041050223
- ISBN-10: 1041050224
- Artikelnr.: 74446889
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
Umang Garg, PhD, is working as an Associate professor in department of Computer Science and Engineering, MITADT University, Pune, Maharashtra, India. He is committed to advance both research and teaching in the field of Security. He has combined research and teaching experience of over 14 years and done a significant contribution towards the research community working in IoT security using Machine learning. Dr. Garg has done PhD (IoT Security), M.Tech (CSE), and B.Tech (CSE) for his academic Pensiveness. He has published more than 40 research articles with reputed journals and highly indexed conferences. He is Member of CSI and IEEE. Rajesh Singh, PhD, is associated with Uttaranchal University as Professor and Director (Research & Innovation) with more than twenty years of experience in academics and research. His area of expertise includes embedded systems, robotics, wireless sensor networks, Internet of Things and Machine Learning. He has been honored as keynote speakers and session chair to international/national conferences, faculty development programs, workshops and webinars. He has filed more than 500 IPR, including 100+ Indian & International patent grants, 5 PCT and published more than 439 research papers in SCI/Scopus journals. He has authored/edited forty three books in the area of Embedded Systems and Internet of Things with reputed publishers like CRC/Taylor & Francis, Springer, Narosa, NIPA, River Publishers, Bentham Science, IGI Global, NOVA Science etc. He has been featured by Indian and International media for smart systems and devices designed by him including-OBDAS, E-Parirakshak, Kawach, 20Sec4Life, Ally, Alithis, CT scan Diagnosis, among which five are designed to prevent COVID-19 as per WHO guidelines. Anita Gehlot, PhD, is associated with Uttaranchal University as Professor and Head - Research & Innovation with more than sixteen years of experience. Her area of expertise includes embedded systems, wireless sensor networks, Internet of Things, Artificial Intelligence and Automation. She has been featured among top ten inventors for ten years 2010-2020, by Clarivate Analytics in "India's Innovation Synopsis" in March 2021. She has filed more than five hundred patents including more than hundered Indian & International patent grants, 5 PCT and published more than three hundred and fifty research papers in SCI/Scopus journals. Five scholars have been awarded with PhD under her supervision. Ankur Dumka, PhD, is working as associate professor from past 6 years and holding various administrative post. He was coordinator and member of smart city dehradun for drafting of proposal. He is having more than 140 research papers with more than 60 sci and Scopus journal publication and more than 120 Scopus publication. He has contributed 8 authored books with reputed international publishers, 15 book chapters, 8 patents granted under his name and 7 published, he is handling 1 research project of more than 10 lakh and 1 consultancy project of govt. Medical college.
Chapter 1: Introduction
1.1 Overview of the Internet of Things (IoT)
1.2 Challenges in IoT
1.3 Security issues in IoT
1.4 Rise of IoT Botnets
1.5 Objectives and Scope of the IoT botnet
1.6 Conclusion Chapter 2: IoT Device Vulnerabilities
2.1 IoT Architecture, protocol, and Techology
2.2 Common Security Weaknesses in IoT Devices
2.2 Firmware and Software Vulnerabilities
2.3 Inadequate Authentication and Authorization
2.4 Insufficient Data Protection and Privacy
2.5 The Role of Manufacturers in IoT Security
2.6 Conclusion Chapter 3: Understanding IoT Botnets
3.1 Anatomy of a Botnet
3.2 Types of Botnets: From PC-Based to IoT Botnets
3.3 Common Botnet Attacks: DDoS, Spam, and Data Theft
3.4 Command-and-Control (C&C) Infrastructure
3.5 Infection Vectors and Propagation Techniques
3.6 Persistence and Evasion Tactics
3.7 Conclusion Chapter 4: Real-World IoT Botnet Case Studies
4.1 The Mirai Botnet
4.2 The Hajime Botnet
4.3 The Reaper Botnet
4.4 Analysis of Recent IoT Botnet Attacks
4.5 Research findings from Case Studies Chapter 5: Detection Techniques for IoT Botnets
5.1 Signature-Based Detection
5.2 Anomaly-Based Detection
5.3 Behavior Analysis
5.4 Machine Learning and AI Approaches
5.5 Network Traffic Analysis and Behavioral Monitoring
5.6 Challenges in Detecting IoT Botnets Chapter 6: Mitigation and Prevention Strategies
6.1 Best Practices for Securing IoT Devices
6.2 Firmware Updates and Patch Management
6.3 Strong Authentication and Encryption Mechanisms
6.4 Network Segmentation and Isolation
6.5 Incident Response and Recovery Strategies Chapter 7: The Role of IoT Manufacturers and Developers
7.1 Secure Software Development Life Cycle (SDLC) for IoT
7.2 Implementing Security by Design
7.3 The Importance of User Education and Awareness
7.4 Industry Standards and Certifications Chapter 8: Global Perspectives on IoT Security
8.1 International Standards and Frameworks
8.2 The Role of Governments and Regulatory Bodies
8.3 Collaborative Efforts in Combatting IoT Botnets
8.4 The Future of Global IoT Security Chapter 9: Future Trends in IoT Botnets and Security
9.1 Emerging Threats in IoT Ecosystems
9.2 The Role of AI and Machine Learning in Future Botnets
9.3 Predicting and Preparing for the Next Wave of Attacks
9.4 Innovations in Detection and Prevention Technologies Conclusion
Summary
The Importance of a Proactive Approach to IoT Security
Final Thoughts on the Evolving IoT Threat Landscape
1.1 Overview of the Internet of Things (IoT)
1.2 Challenges in IoT
1.3 Security issues in IoT
1.4 Rise of IoT Botnets
1.5 Objectives and Scope of the IoT botnet
1.6 Conclusion Chapter 2: IoT Device Vulnerabilities
2.1 IoT Architecture, protocol, and Techology
2.2 Common Security Weaknesses in IoT Devices
2.2 Firmware and Software Vulnerabilities
2.3 Inadequate Authentication and Authorization
2.4 Insufficient Data Protection and Privacy
2.5 The Role of Manufacturers in IoT Security
2.6 Conclusion Chapter 3: Understanding IoT Botnets
3.1 Anatomy of a Botnet
3.2 Types of Botnets: From PC-Based to IoT Botnets
3.3 Common Botnet Attacks: DDoS, Spam, and Data Theft
3.4 Command-and-Control (C&C) Infrastructure
3.5 Infection Vectors and Propagation Techniques
3.6 Persistence and Evasion Tactics
3.7 Conclusion Chapter 4: Real-World IoT Botnet Case Studies
4.1 The Mirai Botnet
4.2 The Hajime Botnet
4.3 The Reaper Botnet
4.4 Analysis of Recent IoT Botnet Attacks
4.5 Research findings from Case Studies Chapter 5: Detection Techniques for IoT Botnets
5.1 Signature-Based Detection
5.2 Anomaly-Based Detection
5.3 Behavior Analysis
5.4 Machine Learning and AI Approaches
5.5 Network Traffic Analysis and Behavioral Monitoring
5.6 Challenges in Detecting IoT Botnets Chapter 6: Mitigation and Prevention Strategies
6.1 Best Practices for Securing IoT Devices
6.2 Firmware Updates and Patch Management
6.3 Strong Authentication and Encryption Mechanisms
6.4 Network Segmentation and Isolation
6.5 Incident Response and Recovery Strategies Chapter 7: The Role of IoT Manufacturers and Developers
7.1 Secure Software Development Life Cycle (SDLC) for IoT
7.2 Implementing Security by Design
7.3 The Importance of User Education and Awareness
7.4 Industry Standards and Certifications Chapter 8: Global Perspectives on IoT Security
8.1 International Standards and Frameworks
8.2 The Role of Governments and Regulatory Bodies
8.3 Collaborative Efforts in Combatting IoT Botnets
8.4 The Future of Global IoT Security Chapter 9: Future Trends in IoT Botnets and Security
9.1 Emerging Threats in IoT Ecosystems
9.2 The Role of AI and Machine Learning in Future Botnets
9.3 Predicting and Preparing for the Next Wave of Attacks
9.4 Innovations in Detection and Prevention Technologies Conclusion
Summary
The Importance of a Proactive Approach to IoT Security
Final Thoughts on the Evolving IoT Threat Landscape
Chapter 1: Introduction
1.1 Overview of the Internet of Things (IoT)
1.2 Challenges in IoT
1.3 Security issues in IoT
1.4 Rise of IoT Botnets
1.5 Objectives and Scope of the IoT botnet
1.6 Conclusion Chapter 2: IoT Device Vulnerabilities
2.1 IoT Architecture, protocol, and Techology
2.2 Common Security Weaknesses in IoT Devices
2.2 Firmware and Software Vulnerabilities
2.3 Inadequate Authentication and Authorization
2.4 Insufficient Data Protection and Privacy
2.5 The Role of Manufacturers in IoT Security
2.6 Conclusion Chapter 3: Understanding IoT Botnets
3.1 Anatomy of a Botnet
3.2 Types of Botnets: From PC-Based to IoT Botnets
3.3 Common Botnet Attacks: DDoS, Spam, and Data Theft
3.4 Command-and-Control (C&C) Infrastructure
3.5 Infection Vectors and Propagation Techniques
3.6 Persistence and Evasion Tactics
3.7 Conclusion Chapter 4: Real-World IoT Botnet Case Studies
4.1 The Mirai Botnet
4.2 The Hajime Botnet
4.3 The Reaper Botnet
4.4 Analysis of Recent IoT Botnet Attacks
4.5 Research findings from Case Studies Chapter 5: Detection Techniques for IoT Botnets
5.1 Signature-Based Detection
5.2 Anomaly-Based Detection
5.3 Behavior Analysis
5.4 Machine Learning and AI Approaches
5.5 Network Traffic Analysis and Behavioral Monitoring
5.6 Challenges in Detecting IoT Botnets Chapter 6: Mitigation and Prevention Strategies
6.1 Best Practices for Securing IoT Devices
6.2 Firmware Updates and Patch Management
6.3 Strong Authentication and Encryption Mechanisms
6.4 Network Segmentation and Isolation
6.5 Incident Response and Recovery Strategies Chapter 7: The Role of IoT Manufacturers and Developers
7.1 Secure Software Development Life Cycle (SDLC) for IoT
7.2 Implementing Security by Design
7.3 The Importance of User Education and Awareness
7.4 Industry Standards and Certifications Chapter 8: Global Perspectives on IoT Security
8.1 International Standards and Frameworks
8.2 The Role of Governments and Regulatory Bodies
8.3 Collaborative Efforts in Combatting IoT Botnets
8.4 The Future of Global IoT Security Chapter 9: Future Trends in IoT Botnets and Security
9.1 Emerging Threats in IoT Ecosystems
9.2 The Role of AI and Machine Learning in Future Botnets
9.3 Predicting and Preparing for the Next Wave of Attacks
9.4 Innovations in Detection and Prevention Technologies Conclusion
Summary
The Importance of a Proactive Approach to IoT Security
Final Thoughts on the Evolving IoT Threat Landscape
1.1 Overview of the Internet of Things (IoT)
1.2 Challenges in IoT
1.3 Security issues in IoT
1.4 Rise of IoT Botnets
1.5 Objectives and Scope of the IoT botnet
1.6 Conclusion Chapter 2: IoT Device Vulnerabilities
2.1 IoT Architecture, protocol, and Techology
2.2 Common Security Weaknesses in IoT Devices
2.2 Firmware and Software Vulnerabilities
2.3 Inadequate Authentication and Authorization
2.4 Insufficient Data Protection and Privacy
2.5 The Role of Manufacturers in IoT Security
2.6 Conclusion Chapter 3: Understanding IoT Botnets
3.1 Anatomy of a Botnet
3.2 Types of Botnets: From PC-Based to IoT Botnets
3.3 Common Botnet Attacks: DDoS, Spam, and Data Theft
3.4 Command-and-Control (C&C) Infrastructure
3.5 Infection Vectors and Propagation Techniques
3.6 Persistence and Evasion Tactics
3.7 Conclusion Chapter 4: Real-World IoT Botnet Case Studies
4.1 The Mirai Botnet
4.2 The Hajime Botnet
4.3 The Reaper Botnet
4.4 Analysis of Recent IoT Botnet Attacks
4.5 Research findings from Case Studies Chapter 5: Detection Techniques for IoT Botnets
5.1 Signature-Based Detection
5.2 Anomaly-Based Detection
5.3 Behavior Analysis
5.4 Machine Learning and AI Approaches
5.5 Network Traffic Analysis and Behavioral Monitoring
5.6 Challenges in Detecting IoT Botnets Chapter 6: Mitigation and Prevention Strategies
6.1 Best Practices for Securing IoT Devices
6.2 Firmware Updates and Patch Management
6.3 Strong Authentication and Encryption Mechanisms
6.4 Network Segmentation and Isolation
6.5 Incident Response and Recovery Strategies Chapter 7: The Role of IoT Manufacturers and Developers
7.1 Secure Software Development Life Cycle (SDLC) for IoT
7.2 Implementing Security by Design
7.3 The Importance of User Education and Awareness
7.4 Industry Standards and Certifications Chapter 8: Global Perspectives on IoT Security
8.1 International Standards and Frameworks
8.2 The Role of Governments and Regulatory Bodies
8.3 Collaborative Efforts in Combatting IoT Botnets
8.4 The Future of Global IoT Security Chapter 9: Future Trends in IoT Botnets and Security
9.1 Emerging Threats in IoT Ecosystems
9.2 The Role of AI and Machine Learning in Future Botnets
9.3 Predicting and Preparing for the Next Wave of Attacks
9.4 Innovations in Detection and Prevention Technologies Conclusion
Summary
The Importance of a Proactive Approach to IoT Security
Final Thoughts on the Evolving IoT Threat Landscape







