Triage of IoT Attacks Through Process Mining

被引:8
|
作者
Coltellese, Simone [1 ]
Maggi, Fabrizio Maria [2 ]
Marrella, Andrea [1 ]
Massarelli, Luca [1 ]
Querzoni, Leonardo [1 ]
机构
[1] Sapienza Univ Roma, DIAG, Rome, Italy
[2] Univ Tartu, Tartu, Estonia
基金
欧盟地平线“2020”;
关键词
IoT security; Process mining; Behavioral attack analysis; PROCESS EXECUTIONS; PROCESS MODELS;
D O I
10.1007/978-3-030-33246-4_22
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The impressive growth of the IoT we witnessed in the recent years came together with a surge in cyber attacks that target it. Factories adhering to digital transformation programs are quickly adopting the IoT paradigm and are thus increasingly exposed to a large number of cyber threats that need to be detected, analyzed and appropriately mitigated. In this scenario, a common approach that is used in large organizations is to setup an attack triage system. In this setting, security operators can cherry-pick new attack patterns requiring further in-depth investigation from a mass of known attacks that can be managed automatically. In this paper, we propose an attack triage system that helps operators to quickly identify attacks with unknown behaviors, and later analyze them in detail. The novelty introduced by our solution is in the usage of process mining techniques to model known attacks and identify new variants. We demonstrate the feasibility of our approach through an evaluation based on three well-known IoT botnets, BASHLITE, LIGHTAIDRA and MIRAI, and on real current attack patterns collected through an IoT honeypot.
引用
下载
收藏
页码:326 / 344
页数:19
相关论文
共 50 条
  • [41] IoT Attacks: Features Identification and Clustering
    Haseeb, Junaid
    Mansoori, Masood
    Al-Sahaf, Harith
    Welch, Ian
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 353 - 360
  • [42] Detection and Prevention of DDoS Attacks on the IoT
    Lee, Shu-Hung
    Shiue, Yeong-Long
    Cheng, Chia-Hsin
    Li, Yi-Hong
    Huang, Yung-Fa
    APPLIED SCIENCES-BASEL, 2022, 12 (23):
  • [43] Acoustic Attacks in the Era of IoT - A Survey
    Hamed, Ahmed
    Khalek, Ahmed Abdel
    PROCEEDINGS 2019 AMITY INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE (AICAI), 2019, : 855 - 858
  • [44] Fuzzy Modeling Built Through a Data Mining Process
    Wilges, B.
    Mateus, G. P.
    Nassar, S. M.
    Bastos, R. C.
    IEEE LATIN AMERICA TRANSACTIONS, 2012, 10 (02) : 1622 - 1626
  • [45] Performance Analysis of Healthcare Processes through Process Mining
    Ferreira, Diogo R.
    ERCIM NEWS, 2012, (89): : 18 - 19
  • [46] Applications of quantitative process mineralogy through the mining cycle
    Sutherland, D
    AUSIMM'98: THE MINING CYCLE, 1998, 98 (02): : 333 - 337
  • [47] Knowledge discovery through mining process operational data
    Wang, XZ
    APPLICATION OF NEURAL NETWORKS AND OTHER LEARNING TECHNOLOGIES IN PROCESS ENGINEERING, 2001, : 287 - 328
  • [48] Exploring The Security Issues in Home-Based IoT Devices Through Denial of Service Attacks
    Toutsop, Otily
    Das, Sanchari
    Kornegay, Kevin
    2021 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING & COMMUNICATIONS, INTERNET OF PEOPLE, AND SMART CITY INNOVATIONS (SMARTWORLD/SCALCOM/UIC/ATC/IOP/SCI 2021), 2021, : 407 - 415
  • [49] User-Centered and Privacy-Driven Process Mining System Design for IoT
    Michael, Judith
    Koschmider, Agnes
    Mannhardt, Felix
    Baracaldo, Nathalie
    Rumpe, Bernhard
    INFORMATION SYSTEMS ENGINEERING IN RESPONSIBLE INFORMATION SYSTEMS, CAISE FORUM 2019, 2019, 350 : 194 - 206
  • [50] Threat analysis model to control IoT network routing attacks through deep learning approach
    Janani, K.
    Ramamoorthy, S.
    CONNECTION SCIENCE, 2022, 34 (01) : 2714 - 2754