Generating and Sharing IoT-Centric Cyber Threat Intelligence

To automate the collection and analysis of relevant data to infer unsolicited IoT devices and their hosting environments, in near real-time, the automated platform is developed. In this chapter, the core functions, their implementation design, and performance are discussed and evaluated.