2019 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA) 2019
DOI: 10.1109/cybersa.2019.8899580
|View full text |Cite
|
Sign up to set email alerts
|

Towards a Conversational Agent for Threat Detection in the Internet of Things

Abstract: A conversational agent to detect anomalous traffic in consumer IoT networks is presented. The agent accepts two inputs in the form of user speech received by Amazon Alexa enabled devices, and classified IDS logs stored in a DynamoDB Table. Aural analysis is used to query the database of network traffic, and respond accordingly. In doing so, this paper presents a solution to the problem of making consumers situationally aware when their IoT devices are infected, and anomalous traffic has been detected. The prop… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
2
1
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 22 publications
0
4
0
Order By: Relevance
“…When applied to the Cyber domain, Cyber Situational Awareness (CSA) can be defined as the compilation, processing and fusing of network data to understand a network environment in order to accurately predict and respond to potential threats that might occur [17]. In this respect it is clearly linked to network security monitoring which can be traced back to Anderson's seminal work [18] that analysed security logs for anomalies.…”
Section: B Cyber Situational Awareness (Csa)mentioning
confidence: 99%
“…When applied to the Cyber domain, Cyber Situational Awareness (CSA) can be defined as the compilation, processing and fusing of network data to understand a network environment in order to accurately predict and respond to potential threats that might occur [17]. In this respect it is clearly linked to network security monitoring which can be traced back to Anderson's seminal work [18] that analysed security logs for anomalies.…”
Section: B Cyber Situational Awareness (Csa)mentioning
confidence: 99%
“…This tool was planned to be used in large companies, where employees' faceto-face training is infeasible. [18] proposed a conversational agent to address the complexity of how to present network information to non-technical users about the behavior of IoT devices, helping identify when devices are part of a botnet. However, none of these solutions focus on business demands or directly explore different tasks involved in the decisionmaking, configuration, and cybersecurity management.…”
Section: Related Workmentioning
confidence: 99%
“…Since the seminal work of Endsley (Endsley, 1995) situational awareness has been applied to a number of areas such as safety, security and transportation. Situational awareness has been applied in cyber security, vehicular networks, aviation, social media analytics and conversational agents (Onwubiko C., 2009, Eiza M. H., 2017, & McDermott, C. D., Jeannelle, B., and Isaacs, J. P., 2019.…”
Section: Cyber Situational Awarenessmentioning
confidence: 99%
“…situational awareness has been applied to a number of areas such as safety, security and transportation. Situational awareness has been applied in cyber security, vehicular networks, aviation, social media analytics and conversational agents(Onwubiko C., 2009, Eiza M. H., 2017, & McDermott, C. D., Jeannelle, B., and Isaacs, J. P., 2019.Cyber Situational Awareness (Cyber SA) has been defined in many ways in relation to cyber security, cyber defense, and cyber operations in general (see,McGuiness B., Foy J. L., 2000, Cumiford D. L., 2006and Tadda G. P., and Salerno J. S., 2010.…”
mentioning
confidence: 99%