Section 1: Introduction to IoT Network Analysis
• Logistics
• Internet of Things (IoT) Network analysis challenges
Section 2: Recap – Collecting the Data – Data Capture
Data Collection
• Configuring Wireshark
• Configurations – LAN vs. IoT
• USBPcap / Androiddump
• Bluetooth capture features
• Using capture filters to capture specific types of traffic
• Location – How Network Infrastructure Devices Affect Network Analysis
• Stealth / Silent Collection of Data – Tips & Techniques
• Real-time vs. Post-Capture Analysis
• IoT Device Analysis
• WiFi features & WEP / WPA / WPA2 Decryption
Is It Good or Bad – The Role of Baselines in IoT Analysis
• What’s Normal vs. Abnormal – The Role of Baseline Files
• Building a Baseline Library – Where Do I go to Find Samples?
Section 3: IoT Technologies
Overview and Introduction to IoT-Based Technologies
• IoT Terminology & Technologies
• IoT Enabling Technologies
• Wired – Power Line Communications (PLC)
• IEEE 802.11ah HaLow Short, medium, and long-Range Wireless
• Medical (IoTM) and Body Area Networks (BAN)
IoT Architecture, Routing, and Connectivity
• Nomenclature, Terminology, and IOT Architecture
• Star, Tree, Ring, and Mesh
• IoT Communication Models
• IoT Ecosystems
• Emerging IoT Generation Technologies
• IoT Hardware vs. Software
• Thread Protocol & IPv6 Networking
• Overview & Analysis
• ZigBee & IPv6 Networking
IoT Conversations and Activities
• Analysing IoT Conversations and Activities to Determine Unusual Activity
• Analysing Latency and Throughput to recognize suspicious user traffic
• Using Statistical Analysis to Isolate & Identify Suspect Conversations
• IoT Network Analysis Methodology
• Answering the Key Troubleshooting and Analysis Questions – A sample 6 Step methodology for IoT-based Network Analysis
Diagraming Conversations – A Picture is worth 1024 Words
• Related Packet & Intelligent Scrollbar features
• Constructing a Troubleshooting and Analysis Diagram Tips & Techniques
Special Considerations for Analyzing IoT WiFi-Based Traffic
• IoT / WiFi Fundamentals
• Frequency, Bandwidth & Channel Considerations
• Spread Spectrum Technologies
• Frequency Hopping Spread Spectrum (FHSS)
• Direct Sequence Spread Spectrum (DSSS)
• Orthogonal Frequency Division Multiplexing (OFDM)
• Spatial Division Multiplexing (SDM)
• Minimum Frequency Shift Keying (MSK)
• IoT MAC Layer
• Finding a Service / Device Set
• Connecting, Authenticating & Associating to a Set
• Moving Between and disconnecting from Sets
• IoT / Wireless Frame Addressing
• IoT / WiFi Frame Translation
Key IoT Technologies: SoHo and IoT
• Structure, Operation, and Analysis of Key IoT Technologies
• IEEE 802.15 Bluetooth Classic. Bluetooth LE
• IEEE 802.15.4 ZigBee
• IEEE 802.16e WiMAX
• Home RF
• Z-Wave / DTLS
• DMX / DMX 512
• RFID / Near Field Communications (NFC)
• Infrared / LiFi ix. PBCC
• BACnet / Modbus
• IP
• SIP
• 3G / 4G / 5G
IoT Security – Vulnerabilities, Threats, and Examples of Intrusion Signatures
• Overview of IoT-based Security Vulnerabilities
• The Key Issue – Competing Standards and Lack of Regulations
• Special Considerations – IoT Medical Equipment
• Special Considerations – IoT Home Automation
• Rouge IoT Devices
• UPNP Exploitation
• Man-in-the-Middle IoT Devices
• Malware / Ransomware
• IoT Denial of Service (DoS / DDoS) Attacks
• IoT Bots / Botnets
• Fixing the Problem
• Security Recommendations
• IEEE 802.1x Radius Overview
• CCMP Authentication and Encryption protocol
• WiFi / IoT Encryption
• Wired Equivalency Protocol (WEP)
• WiFi Protected Access (WPA / WPA2)
• Bluetooth Classis / Bluetooth LE Encryption
• ZigBee Encryption