Skip to main content
Log in

Applying correlation analysis methods to control flow violation detection in the internet of things

  • Published:
Automatic Control and Computer Sciences Aims and scope Submit manuscript

Abstract

In this paper, authors describe the ain features of the Internet of Things, and potential security threats caused by these features. Authors propose an approach to the detection of incidents in the Internet of Things, based on a correlation analysis of data from the devices of the Internet of Things.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. EU FP7 Project CASAGRAS, “CASAGRAS Final Report: RFID and the Inclusive Model for the Internet of Things,” 2009, pp. 10–12.

    Google Scholar 

  2. Bryant, B., dA Method for Implementing Intention-Based Attack Ontologies with SIEM Software, 2014.

    Google Scholar 

  3. Goel, S. and Chen, V., Information security risk analysis–A matrix-based approach, Proceedings of the Information Resource Management Association (IRMA), International Conference, Information Resources Management Association, Hershey, PA, 2005.

    Google Scholar 

  4. Lee, J.-K. and Im, C.-T., Correlation Analysis of Cyber Threat Information in Heterogeneous Security Systems. Applied Security Technology Team, Korea Internet and Security Agency, 2013.

    Google Scholar 

  5. Zhaojun, G. and Yong, L., Research of security event correlation based on attribute similarity, IC3T'12, Proceedings of the 2012 International Conference on Convergence Computer Technology, 2012, pp. 110–113.

    Google Scholar 

  6. Jiang, G. and Cybenko, G., Temporal and Spatial Distributed Event Correlation for Network Security, Proceedings of the American Control Conference, 2004, vol. 2, pp. 996–1001.

    Google Scholar 

  7. Zheng, Z., Wang, J., and Zhu, Z., A general anomaly detection framework for Internet of Things, Proc. 41st IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'11), Hong Kong, 2011.

    Google Scholar 

  8. Jie, X., Hongjun, B., and Yun, L., Research on security threat assessment method based on the attack tree model of the Internet of Things, JCIT, 2013, vol. 8, no. 3, pp. 653–658.

    Article  Google Scholar 

  9. Event correlation: Move from search to operational intelligence, whitepaper.

  10. Dong, C., Xiuquan, Q., et al., Mining data correlation from multi-faceted sensor data in the Internet of Things, China Commun., 2011, vol. 8, no. 1, pp. 132–138.

    Google Scholar 

  11. Mietz, R. and Romer, K., Exploiting Correlations for Efficient Content-based Sensor Search, IEEE Sensors, 2011, pp. 187–190.

    Google Scholar 

  12. Chatzigiannakis, I., Hasemann, H., Karnstedt, M., and Kleine, O., True self-configuration for the IoT, 3rd International Conference on the Internet of Things (IOT), 2012, pp. 135–142.

    Google Scholar 

  13. Shafagh, H. and Hithnawi, A., Poster: Come closer–proximity-based authentication for the Internet of Things, MobiCom, 2014.

    Google Scholar 

  14. Baneriee, O., Ghaoui, L.E., and D’aspremont, A., Model selection through sparse maximum likelihood estimation for multivariate Gaussian or binary data [J], J. Mach. Learn. Res., 2008, vol. 9, no. 3, pp. 485–516.

    MathSciNet  Google Scholar 

  15. Amizadeh, S. and Hauskrecht, M., Latent variable model for learning in pairwise Markov networks [C], Proceedings of the 24th AAAI Conference on Artificial Intelligence, Atlanta, GA; Menlo Park, CA; 2010, pp. 382–387.

    Google Scholar 

  16. Friedman, J., Hastie, T., and Tibshirani, R., Sparse inverse covariance estimation with the graphical lasso, Biostatistics, 2008, vol. 9, no. 3, pp. 432–441.

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to D. Lavrova.

Additional information

The article is published in the original.

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lavrova, D., Pechenkin, A. & Gluhov, V. Applying correlation analysis methods to control flow violation detection in the internet of things. Aut. Control Comp. Sci. 49, 735–740 (2015). https://doi.org/10.3103/S0146411615080283

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S0146411615080283

Keywords

Navigation