Blog Archives

Running multi-container (WSO2 BAM & MAC Address Lookup) Docker Application using Docker Compose

In my 4 previous blog post I explained each part of this Proof-of-concept, they are: Analysing Wireless traffic in real time with WSO2 BAM, Apache Cassandra, Complex Event Processor (CEP Siddhi), Apache Thrift and Python: Part I (http://wp.me/p8pPj-pE) Part II

Tagged with: , , , , , , ,
Posted in BAM, IoT, Linux, Microservices, Security, SOA

A MAC Address Manufacturer DB and RESTful Python Microservice in a Docker Container

A MAC address, also called physical address, is a unique identifier assigned to every network interfaces for communications on the physical network segment. In other words, you can identify the manufacturer of your device through your pyshical address. There are

Tagged with: , , , , ,
Posted in Big Data, Microservices, Security, SOA

Wardriving with WIFI Pineapple Nano in Mobile World Congress 2016 at Barcelona

WIFI Pineapple Nano is a nice tiny device to do Wireless Security Auditing. It has OpenWRT embedded as S.O. with 2 Wireless NIC pre-configured and a lot of Security tools pre-installed ready to perform a Security Wireless Auditing. For further

Tagged with: , , , , ,
Posted in Big Data, IoT, Linux, Security

Everything generates data: Capturing WIFI anonymous traffic using Raspberry Pi and WSO2 BAM (Part III)

After configuring the Raspberry Pi in monitor WIFI/802.11 mode (first blog post) and after configuring Raspberry Pi to send the 802.11 captured traffic to WSO2 BAM and Apache Thrift listener (second blog post), now I will explain how to create

Tagged with: , , , , , , ,
Posted in BAM, Big Data, IoT, Security

Everything generates data: Capturing WIFI anonymous traffic using Raspberry Pi and WSO2 BAM (Part II)

After configuring the Raspberry Pi to capture WIFI/802.11 traffic (first blog post), we have to store this traffic in a Database (NoSQL and RDBMS). Because, the idea is to process in real-time and/or batch the stored data. To capture this

Tagged with: , , , , , , ,
Posted in BAM, Big Data, IoT, Security

Everything generates data: Capturing WIFI anonymous traffic using Raspberry Pi and WSO2 BAM (Part I)

Yes, in this digital world, everything generates data, but before to do BigData, you have to follow these steps: 1. Capture Acquires, Integrates data. 2. Store Classification, Consolidate, Transformation, Storage Design, etc. 3. Analysis Exploration, visualization, modeling, prediction, etc. Everything

Tagged with: , , , , , , ,
Posted in BAM, Big Data, IoT, Security

Log Events Management in WSO2 (Micro)services: ELK & rTail (Part II)

Trailing and checking the performance and the health of (micro)services are important tasks to be accomplished. The logging is a time consuming process and we have to prepare before in order to be more productive. There are many tools out

Tagged with: , , , , , , , , , ,
Posted in Microservices, SOA
Archives