Security in IoT – Distributed Danial of Service (DDoS) II

This post is the second part of the last post and will describe the architecture along with characteristics of Malware especially Mirai and Hajime. Characteristics of IoT malware As mentioned before, the IoT device should get the Malware in order to participate in DDoS attacks. Most of the malwares are Linux based and has limited

Security in IoT – Distributed Danial of Service (DDoS) I

The goal in this post and the next one is to describe Distributed Danial of Service attack, its architecture, and the most common Malware for DDoS in IoT devices. What is Danial of Service One of the most popular attacks is the Denial of Service attack in which the attacker tries to make the server

Security in IoT – Overview

In this post series, I’m going to talk about security in IoT devices and I try to clarify the following aspects and questions about them: Security for IoT devices. Motivation and why people should care about the security of their IoT device or more general, for every device that can connect to the Internet? IoT

Adding AWS Cognito Sign in and Sign up to Android App

Adding user Sign-in of AWS Cognito to Android app is relatively easy, so this post would be short and easy to follow. Before adding authentication to the project, we should add some prerequisites to our Android project. Basically, there are three prerequisites for each Android app which wants to connect to communicate with AWS. These

Round Trip Time (RTT) with Python

RTT is the length of time it takes for a signal to be sent plus the length of time it takes for an acknowledgment of that signal to be received [1]. In other words, a small packet will be sent to a specific computer and it will send the packet back, the time difference between

What is Edge and Edge Computing

According to Wikipedia, Edge Computing is a method of optimizing applications or cloud computing systems by taking some portion of an application, its data, or services away from one or more central nodes (the “core”) to the other logical extreme (the “edge”) of the Internet which makes contact with the physical world or end users

Serverless Computing II

In part I, I’ve described Serverless Computing in detail with an example. In this post, I’ll start by describing serverless platforms and toolkits and continue with comparing some of them to each other. B. Serverless Platform Cloud providers offer Serverless platforms which are ready to develop and deploy a serverless application. Most popular platforms are

Serverless Computing I

Serverless computing is changing the way of computation in the cloud and even in the network edges. Companies are spending time and money to maintain their servers and related software in order to make their business application up and running for their users. Traditional server-based computation slows down companies to go to the market which