Blog Archives

Mass provisioning of Kismet and Apache MiNiFi in Raspberry Pi using Ansible

Lately I’m focusing on Automation in Big-Data Projects, and with my experience in Cyber Security I can bring new approaches and ideas to those Big-Data Projects are related to IT Security aspects (Threat Analisys, Privacy, Intrusion Detection, etc.). With this

Tagged with: , , , , , , , ,
Posted in Big Data, DevOps, IoT, Security

Running multi-container (WSO2 BAM & MAC Address Lookup) Docker Application using Docker Compose

In my 4 previous blog post I explained each part of this Proof-of-concept, they are: Analysing Wireless traffic in real time with WSO2 BAM, Apache Cassandra, Complex Event Processor (CEP Siddhi), Apache Thrift and Python: Part I (http://wp.me/p8pPj-pE) Part II

Tagged with: , , , , , , ,
Posted in BAM, IoT, Linux, Microservices, Security, SOA

A MAC Address Manufacturer DB and RESTful Python Microservice in a Docker Container

A MAC address, also called physical address, is a unique identifier assigned to every network interfaces for communications on the physical network segment. In other words, you can identify the manufacturer of your device through your pyshical address. There are

Tagged with: , , , , ,
Posted in Big Data, Microservices, Security, SOA

Everything generates data: Capturing WIFI anonymous traffic using Raspberry Pi and WSO2 BAM (Part III)

After configuring the Raspberry Pi in monitor WIFI/802.11 mode (first blog post) and after configuring Raspberry Pi to send the 802.11 captured traffic to WSO2 BAM and Apache Thrift listener (second blog post), now I will explain how to create

Tagged with: , , , , , , ,
Posted in BAM, Big Data, IoT, Security

Everything generates data: Capturing WIFI anonymous traffic using Raspberry Pi and WSO2 BAM (Part II)

After configuring the Raspberry Pi to capture WIFI/802.11 traffic (first blog post), we have to store this traffic in a Database (NoSQL and RDBMS). Because, the idea is to process in real-time and/or batch the stored data. To capture this

Tagged with: , , , , , , ,
Posted in BAM, Big Data, IoT, Security

Everything generates data: Capturing WIFI anonymous traffic using Raspberry Pi and WSO2 BAM (Part I)

Yes, in this digital world, everything generates data, but before to do BigData, you have to follow these steps: 1. Capture Acquires, Integrates data. 2. Store Classification, Consolidate, Transformation, Storage Design, etc. 3. Analysis Exploration, visualization, modeling, prediction, etc. Everything

Tagged with: , , , , , , ,
Posted in BAM, Big Data, IoT, Security
Archives