Internet of Things Attacks Detection and Classification Using Tiered Hidden Markov Model

Ahmad Alshammari, M. Zohdy
{"title":"Internet of Things Attacks Detection and Classification Using Tiered Hidden Markov Model","authors":"Ahmad Alshammari, M. Zohdy","doi":"10.1145/3316615.3316729","DOIUrl":null,"url":null,"abstract":"Internet of Things (IoT) attacks have rapidly risen in frequency in recent years as IoT devices become more commonplace in industry, businesses, and homes. Since these devices have very basic functionality and are not designed with security in mind, they are easy targets for attacks that can steal data or gain access to the network the devices are connected to. Here we propose a tiered system of Hidden Markov Models (HMMs) for identifying these attacks and classifying them by type of attack. This system has a tree-based structure, with the main HMM being applied to the raw network data to identify attacks. This main HMM branches off into separate HMMs for each type of attack to classify the attacks according to how important the consequences of the attack are and how likely each attack is to happen.","PeriodicalId":268392,"journal":{"name":"Proceedings of the 2019 8th International Conference on Software and Computer Applications","volume":"33 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2019 8th International Conference on Software and Computer Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3316615.3316729","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

Internet of Things (IoT) attacks have rapidly risen in frequency in recent years as IoT devices become more commonplace in industry, businesses, and homes. Since these devices have very basic functionality and are not designed with security in mind, they are easy targets for attacks that can steal data or gain access to the network the devices are connected to. Here we propose a tiered system of Hidden Markov Models (HMMs) for identifying these attacks and classifying them by type of attack. This system has a tree-based structure, with the main HMM being applied to the raw network data to identify attacks. This main HMM branches off into separate HMMs for each type of attack to classify the attacks according to how important the consequences of the attack are and how likely each attack is to happen.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于分层隐马尔可夫模型的物联网攻击检测与分类
近年来,随着物联网设备在工业、企业和家庭中变得越来越普遍,物联网(IoT)攻击的频率迅速上升。由于这些设备具有非常基本的功能,并且在设计时没有考虑到安全性,因此它们很容易成为攻击的目标,可以窃取数据或访问设备所连接的网络。在这里,我们提出了一个隐马尔可夫模型(hmm)的分层系统来识别这些攻击并根据攻击类型对它们进行分类。该系统采用树型结构,将主HMM应用于原始网络数据识别攻击。对于每种类型的攻击,这个主要HMM分支为单独的HMM,根据攻击后果的重要性和每次攻击发生的可能性对攻击进行分类。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
BookCeption An Enhanced Key Security of Playfair Cipher Algorithm Adoption Issues in DevOps from the Perspective of Continuous Delivery Pipeline A User Attribute Recommendation Algorithm and Peer3D Technology based WebVR P2P Transmission Scheme Survey of Hyperledger Blockchain Frameworks: Case Study in FPT University's Cryptocurrency Wallets
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1