Triage of IoT Attacks Through Process Mining

被引:8
|
作者
Coltellese, Simone [1 ]
Maggi, Fabrizio Maria [2 ]
Marrella, Andrea [1 ]
Massarelli, Luca [1 ]
Querzoni, Leonardo [1 ]
机构
[1] Sapienza Univ Roma, DIAG, Rome, Italy
[2] Univ Tartu, Tartu, Estonia
基金
欧盟地平线“2020”;
关键词
IoT security; Process mining; Behavioral attack analysis; PROCESS EXECUTIONS; PROCESS MODELS;
D O I
10.1007/978-3-030-33246-4_22
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The impressive growth of the IoT we witnessed in the recent years came together with a surge in cyber attacks that target it. Factories adhering to digital transformation programs are quickly adopting the IoT paradigm and are thus increasingly exposed to a large number of cyber threats that need to be detected, analyzed and appropriately mitigated. In this scenario, a common approach that is used in large organizations is to setup an attack triage system. In this setting, security operators can cherry-pick new attack patterns requiring further in-depth investigation from a mass of known attacks that can be managed automatically. In this paper, we propose an attack triage system that helps operators to quickly identify attacks with unknown behaviors, and later analyze them in detail. The novelty introduced by our solution is in the usage of process mining techniques to model known attacks and identify new variants. We demonstrate the feasibility of our approach through an evaluation based on three well-known IoT botnets, BASHLITE, LIGHTAIDRA and MIRAI, and on real current attack patterns collected through an IoT honeypot.
引用
收藏
页码:326 / 344
页数:19
相关论文
共 50 条
  • [41] Features selection and prediction for IoT attacks
    Su, Jingyi
    He, Shan
    Wu, Yan
    HIGH-CONFIDENCE COMPUTING, 2022, 2 (02):
  • [42] DDoS attacks in Industrial IoT: A survey
    Chaudhary, Shubhankar
    Mishra, Pramod Kumar
    COMPUTER NETWORKS, 2023, 236
  • [43] Detecting DDoS Attacks in IoT Environment
    Labiod, Yasmine
    Korba, Abdelaziz Amara
    Ghoualmi-Zine, Nacira
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2021, 15 (02) : 145 - 180
  • [44] IoT and Man-in-the-Middle Attacks
    Fereidouni, Hamidreza
    Fadeitcheva, Olga
    Zalai, Mehdi
    Security and Privacy, 2025, 8 (02)
  • [45] On Mitigating DIS Attacks in IoT Networks
    Aljufair, Ghada
    Mahyoub, Mohammed
    Almazyad, Abdulaziz S.
    2023 18TH WIRELESS ON-DEMAND NETWORK SYSTEMS AND SERVICES CONFERENCE, WONS, 2023, : 104 - 109
  • [46] A study on network routing attacks in IoT
    Mali S.D.
    Govinda K.
    Materials Today: Proceedings, 2023, 80 : 2997 - 3002
  • [47] IoT Attacks: Features Identification and Clustering
    Haseeb, Junaid
    Mansoori, Masood
    Al-Sahaf, Harith
    Welch, Ian
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 353 - 360
  • [48] Detection and Prevention of DDoS Attacks on the IoT
    Lee, Shu-Hung
    Shiue, Yeong-Long
    Cheng, Chia-Hsin
    Li, Yi-Hong
    Huang, Yung-Fa
    APPLIED SCIENCES-BASEL, 2022, 12 (23):
  • [49] Acoustic Attacks in the Era of IoT - A Survey
    Hamed, Ahmed
    Khalek, Ahmed Abdel
    PROCEEDINGS 2019 AMITY INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE (AICAI), 2019, : 855 - 858
  • [50] User-Centered and Privacy-Driven Process Mining System Design for IoT
    Michael, Judith
    Koschmider, Agnes
    Mannhardt, Felix
    Baracaldo, Nathalie
    Rumpe, Bernhard
    INFORMATION SYSTEMS ENGINEERING IN RESPONSIBLE INFORMATION SYSTEMS, CAISE FORUM 2019, 2019, 350 : 194 - 206