Triage of IoT Attacks Through Process Mining

被引:8
|
作者
Coltellese, Simone [1 ]
Maggi, Fabrizio Maria [2 ]
Marrella, Andrea [1 ]
Massarelli, Luca [1 ]
Querzoni, Leonardo [1 ]
机构
[1] Sapienza Univ Roma, DIAG, Rome, Italy
[2] Univ Tartu, Tartu, Estonia
基金
欧盟地平线“2020”;
关键词
IoT security; Process mining; Behavioral attack analysis; PROCESS EXECUTIONS; PROCESS MODELS;
D O I
10.1007/978-3-030-33246-4_22
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The impressive growth of the IoT we witnessed in the recent years came together with a surge in cyber attacks that target it. Factories adhering to digital transformation programs are quickly adopting the IoT paradigm and are thus increasingly exposed to a large number of cyber threats that need to be detected, analyzed and appropriately mitigated. In this scenario, a common approach that is used in large organizations is to setup an attack triage system. In this setting, security operators can cherry-pick new attack patterns requiring further in-depth investigation from a mass of known attacks that can be managed automatically. In this paper, we propose an attack triage system that helps operators to quickly identify attacks with unknown behaviors, and later analyze them in detail. The novelty introduced by our solution is in the usage of process mining techniques to model known attacks and identify new variants. We demonstrate the feasibility of our approach through an evaluation based on three well-known IoT botnets, BASHLITE, LIGHTAIDRA and MIRAI, and on real current attack patterns collected through an IoT honeypot.
引用
下载
收藏
页码:326 / 344
页数:19
相关论文
共 50 条
  • [31] Process Analytics Through Event Databases: Potentials for Visualizations and Process Mining
    Delias, Pavlos
    Kazanidis, Ioannis
    DECISION SUPPORT SYSTEMS VII: DATA, INFORMATION AND KNOWLEDGE VISUALIZATION IN DECISION SUPPORT SYSTEMS, 2017, 282 : 88 - 100
  • [32] An IoT Honeynet Based on Multiport Honeypots for Capturing IoT Attacks
    Zhang, Weizhe
    Zhang, Bin
    Zhou, Ying
    He, Hui
    Ding, Zeyu
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (05): : 3991 - 3999
  • [33] Assessing the Robustness in Predictive Process Monitoring through Adversarial Attacks
    Stevens, Alexander
    De Smedt, Johannes
    Peeperkorn, Jari
    De Weerdt, Jochen
    2022 4TH INTERNATIONAL CONFERENCE ON PROCESS MINING (ICPM 2022), 2022, : 56 - 63
  • [34] Predicting Pre-triage Waiting Time in a Maternity Emergency Room Through Data Mining
    Pereira, Sonia
    Portela, Filipe
    Santos, Manuel F.
    Machado, Jose
    Abelha, Antonio
    SMART HEALTH, ICSH 2015, 2016, 9545 : 105 - 117
  • [35] Exploration of Impactful Countermeasures on IoT Attacks
    Chehida, Salim
    Baouya, Abdelhakim
    Bozga, Marius
    Bensalem, Saddek
    2020 9TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING (MECO), 2020, : 198 - 201
  • [36] Features selection and prediction for IoT attacks
    Su, Jingyi
    He, Shan
    Wu, Yan
    HIGH-CONFIDENCE COMPUTING, 2022, 2 (02):
  • [37] DDoS attacks in Industrial IoT: A survey
    Chaudhary, Shubhankar
    Mishra, Pramod Kumar
    COMPUTER NETWORKS, 2023, 236
  • [38] Detecting DDoS Attacks in IoT Environment
    Labiod, Yasmine
    Korba, Abdelaziz Amara
    Ghoualmi-Zine, Nacira
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2021, 15 (02) : 145 - 180
  • [39] On Mitigating DIS Attacks in IoT Networks
    Aljufair, Ghada
    Mahyoub, Mohammed
    Almazyad, Abdulaziz S.
    2023 18TH WIRELESS ON-DEMAND NETWORK SYSTEMS AND SERVICES CONFERENCE, WONS, 2023, : 104 - 109
  • [40] A study on network routing attacks in IoT
    Mali S.D.
    Govinda K.
    Materials Today: Proceedings, 2023, 80 : 2997 - 3002