2019
DOI: 10.1007/s10207-019-00439-w
|View full text |Cite
|
Sign up to set email alerts
|

A study of IoT malware activities using association rule learning for darknet sensor data

Abstract: Along with the proliferation of IoT (Internet of Things) devices, cyberattacks towards these devices are on the rise. In this paper, we present a study on applying Association Rule Learning (ARL) to discover the regularities of these attacks from the big stream data collected on a large scale darknet. By exploring the regularities in IoT-related indicators such as destination ports, type of service (ToS), and TCP window sizes, we succeeded in discovering the activities of attacking hosts associated with well-k… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
4
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 30 publications
(17 citation statements)
references
References 12 publications
0
16
0
1
Order By: Relevance
“…Additionally, fuzzy association rules are employed to construct a rule-based intrusion detection system [70]. In [75], an FP-tree association rule-based study was carried out to investigate malware behaviors. A belief rule-based anomaly detection under uncertainty has been presented in [76].…”
Section: Rule-based Modeling In Cybersecuritymentioning
confidence: 99%
“…Additionally, fuzzy association rules are employed to construct a rule-based intrusion detection system [70]. In [75], an FP-tree association rule-based study was carried out to investigate malware behaviors. A belief rule-based anomaly detection under uncertainty has been presented in [76].…”
Section: Rule-based Modeling In Cybersecuritymentioning
confidence: 99%
“…Additionally, fuzzy association rules are employed to construct a rule-based intrusion detection system [118]. In [71], an FP-tree association rule-based study was carried out to investigate malware behaviors. A belief rule-based anomaly detection under uncertainty has been presented in [121].…”
Section: Rule-based Modeling In Cybersecuritymentioning
confidence: 99%
“…Saldırı IoT cihazlar aracılığıyla yapılmış en büyük siber saldırılardan biri olmuştur. 21 Ekim 2016'da Alan Adı Sistemi sağlayıcısı Dyn tarafından işletilen sistemleri hedef alan saldırının, Mirai kötü amaçlı yazılımından etkilenmiş yazıcılar, IP kameralar, ev ağ geçitleri ve bebek izleme monitörleri gibi internete bağlı çok sayıda cihazdan oluşan bir botnet aracılığıyla gerçekleştirildiği ifade edilmiştir [26]. Endüstri 4.0 alanında yaşanan siber güvenlik olayları oldukça fazladır.…”
Section: Si̇ber Güvenli̇kunclassified