2021 IEEE International Conference on Cyber Security and Resilience (CSR) 2021
DOI: 10.1109/csr51186.2021.9527983
|View full text |Cite
|
Sign up to set email alerts
|

Towards Automated Matching of Cyber Threat Intelligence Reports based on Cluster Analysis in an Internet-of-Vehicles Environment

Abstract: Connected and automated vehicles are a transformative technology that is getting closer to maturity and offers many benefits to the Internet-of-Vehicles ecosystem. Considering their multi-diverse nature and the vast amount of data they collect, process, and exchange, they attract varying malicious activities that jeopardize security and safety aspects. Therefore, the successful confrontation of such activities is crucial. When detecting such activities, information about the incoming threat is collected and an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 13 publications
0
3
0
Order By: Relevance
“…A synonymous IP flood attack is a type of DDoS attack that aims to consume the resources of DNS servers by sending a high volume of requests for a nonexistent domain. This attack, which uses the TCP protocol, uses high-speed packets [27].…”
Section: Ddosmentioning
confidence: 99%
“…A synonymous IP flood attack is a type of DDoS attack that aims to consume the resources of DNS servers by sending a high volume of requests for a nonexistent domain. This attack, which uses the TCP protocol, uses high-speed packets [27].…”
Section: Ddosmentioning
confidence: 99%
“…• ACK Fragmentation: a relatively small number of maximum-sized packets is used to compromise the network operation. In many cases, these fragmented packets are successfully sent and handled by routers, firewalls, and intrusion prevention systems, given that fragmented packets recompilation is not performed [62] Synonymous IP Flood: an extensive number of manipulated TCP-SYN packets with source and destination addresses as the targeted address, which leads the server to use its resources to process the incoming traffic [72].…”
Section: Executing Dos and Ddos Attacksmentioning
confidence: 99%
“…• Attack Attribution [12], which attempts to identify indicators of compromise, aiming to help security experts to attribute the incoming attack to known threat actors by identifying common tactics, techniques, and procedures, with the use of machine learning approaches, and • Digital Forensics Readiness [1], which attempts to automatically collect digital forensics relative data and to create a forensics investigation report with all the necessary information, while preserving the soundness and integrity of the acquired data and maintaining a valid chain of custody.…”
Section: Niove Frameworkmentioning
confidence: 99%