2021
DOI: 10.1109/jiot.2021.3055937
|View full text |Cite
|
Sign up to set email alerts
|

ADEPT: Detection and Identification of Correlated Attack Stages in IoT Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1
1

Relationship

1
8

Authors

Journals

citations
Cited by 25 publications
(13 citation statements)
references
References 26 publications
0
11
0
Order By: Relevance
“…In detail, the proposed framework was designed with varying constraints, resulting in implementations with different degrees of complexity (in terms of classifiers, features, and reject options). Adept [19] is an attack detection and identification framework for identifying multi-stage distributed attacks on the Internet-of-ings (IoT). It is based on a hierarchical distributed framework, where local gateways monitor network traffic and generate alerts for any anomalous activity.…”
Section: Machine and Deepmentioning
confidence: 99%
“…In detail, the proposed framework was designed with varying constraints, resulting in implementations with different degrees of complexity (in terms of classifiers, features, and reject options). Adept [19] is an attack detection and identification framework for identifying multi-stage distributed attacks on the Internet-of-ings (IoT). It is based on a hierarchical distributed framework, where local gateways monitor network traffic and generate alerts for any anomalous activity.…”
Section: Machine and Deepmentioning
confidence: 99%
“…Then, the pattern extraction of anomalous traffic flows is equivalent to mining the anomalous association rules from flow-level data. A recent work [25] proposed an FIM-based framework for detecting attacks specifically in distributed IoT networks. They mined the patterns to identify spatial and temporal correlations from aggregated alerts generated by home networks; these mined patterns were then fed to a supervised classifier to detect different stages of attacks.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Labeling in this phase means that the intrusion type or class labels are assigned to each cluster. According to [39], the assignment of clusters to corresponding attack stages still needs to be investigated.…”
Section: Alert Correlation For Outlier Detectionmentioning
confidence: 99%
“…A recent work [39] proposes Adept, a distributed framework, to detect individual attack stages in order to uncover a coordinated attack in the IoT security domain. Anomaly detection is performed on the network traffic of IoT devices, and potential anomalies are sent to a security manager.…”
Section: Alert Correlation For Outlier Detectionmentioning
confidence: 99%