Triage of IoT Attacks Through Process Mining

被引:8
|
作者
Coltellese, Simone [1 ]
Maggi, Fabrizio Maria [2 ]
Marrella, Andrea [1 ]
Massarelli, Luca [1 ]
Querzoni, Leonardo [1 ]
机构
[1] Sapienza Univ Roma, DIAG, Rome, Italy
[2] Univ Tartu, Tartu, Estonia
基金
欧盟地平线“2020”;
关键词
IoT security; Process mining; Behavioral attack analysis; PROCESS EXECUTIONS; PROCESS MODELS;
D O I
10.1007/978-3-030-33246-4_22
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The impressive growth of the IoT we witnessed in the recent years came together with a surge in cyber attacks that target it. Factories adhering to digital transformation programs are quickly adopting the IoT paradigm and are thus increasingly exposed to a large number of cyber threats that need to be detected, analyzed and appropriately mitigated. In this scenario, a common approach that is used in large organizations is to setup an attack triage system. In this setting, security operators can cherry-pick new attack patterns requiring further in-depth investigation from a mass of known attacks that can be managed automatically. In this paper, we propose an attack triage system that helps operators to quickly identify attacks with unknown behaviors, and later analyze them in detail. The novelty introduced by our solution is in the usage of process mining techniques to model known attacks and identify new variants. We demonstrate the feasibility of our approach through an evaluation based on three well-known IoT botnets, BASHLITE, LIGHTAIDRA and MIRAI, and on real current attack patterns collected through an IoT honeypot.
引用
下载
收藏
页码:326 / 344
页数:19
相关论文
共 50 条
  • [21] ProvIoT: Detecting Stealthy Attacks in IoT through Federated Edge-Cloud Security
    Mukherjee, Kunal
    Wiedemeier, Joshua
    Wang, Qi
    Kamimura, Junpei
    Rhee, John Junghwan
    Wei, James
    Li, Zhichun
    Yu, Xiao
    Tang, Lu-An
    Gui, Jiaping
    Jee, Kangkook
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2024, PT III, 2024, 14585 : 241 - 268
  • [22] Process Mining and User Privacy in D2D and IoT Networks
    Usman M.
    Qaraqe M.
    Asghar M.R.
    Ansari I.S.
    Informatik-Spektrum, 2019, 42 (05) : 340 - 342
  • [23] Detecting IoT Attacks using Multi-Layer Data Through Machine Learning
    Alam, Hina
    Yaqub, Muhammad Shaharyar
    Nadir, Ibrahim
    2022 SECOND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING AND HIGH PERFORMANCE COMPUTING (DCHPC), 2022, : 52 - 59
  • [24] Data Mining Methods to Analyze Alarm Logs in IoT Process Control Systems
    Dagnino, Aldo
    2019 IEEE 15TH INTERNATIONAL CONFERENCE ON AUTOMATION SCIENCE AND ENGINEERING (CASE), 2019, : 323 - 330
  • [25] HybridRobustNet: enhancing detection of hybrid attacks in IoT networks through advanced learning approach
    Sivasakthi, D. Adhimuga
    Sathiyaraj, A.
    Devendiran, Ramkumar
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (04): : 5005 - 5019
  • [26] Detection and prevention of DDoS attacks on edge computing of IoT devices through reinforcement learning
    Kumar A.
    Singh D.
    International Journal of Information Technology, 2024, 16 (3) : 1365 - 1376
  • [27] NICE: The Native IoT-Centric Event Log Model for Process Mining
    Bertrand, Yannis
    Veneruso, Silvestro
    Leotta, Francesco
    Mecella, Massimo
    Serral, Estefania
    PROCESS MINING WORKSHOPS, ICPM 2023, 2024, 503 : 32 - 44
  • [28] TRIAGE IS A PROCESS, NOT A DESTINATION
    Desseyn, Peggy
    JOURNAL OF EMERGENCY NURSING, 2017, 43 (04) : 375 - 377
  • [29] Mining classification algorithms to identify flooding attacks through the HTTP/3 protocol
    Kadi, Adam
    Khoukhi, Lyes
    Viinikka, Jouni
    Fabre, Pierre-Edouard
    2023 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS, ICC WORKSHOPS, 2023, : 1259 - 1264
  • [30] Analyzing the Devil's Quadrangle of Process Instances Through Process Mining
    Velasquez, Ignacio
    Sepulveda, Marcos
    BUSINESS PROCESS MANAGEMENT WORKSHOPS, BPM 2023, 2024, 492 : 272 - 284