Abstract
With rapid development of IOT technology, QOE is considered in design process to ensure that end users are satisfied using IOT applications and System. However, as if to mock this new paradigm, hackers in the cyber world are attacking the subjective acceptability of an IOT application perceived by the end user through intelligent cyber threats such as DDoS attacks, wiretapping, remote control, ID/Password hijacking using IOT devices. Due to this, the number of SIEM introduction is increasing in order to detect threat patterns in a short period of time with a large amount of structured/unstructured data from IOT devices, to precisely diagnose crisis to threats, and to provide an accurate alarm to an administrator by correlating collected information. In this paper, we design and propose an automated profiling model that leverages the analysis results of the IOT event profiling in SIEM to improve attack detection, efficiency and speed against potential threats.
Similar content being viewed by others
References
http://www.kr.idc.asia/press/pressreleasearticle.aspx?prid=483
Butler B (2014) Gartner: Internet of Things has reached hype peak, 13:8. http://www.networkworld.com/article/2464007/cloudcomputing/gartner-internet-of-things-has-reached-hype-peak.html
Andrey F, Igor K, Didier E (2017) Correlation of security events based on the analysis of structures of event types. Intelligent Data Acquisition and Advanced Computing Systems, IEEE
Gartner Magic Quadrant (2016) Magic Quadrant for Security Information and Event Management, 3
Reza S, Ali G (2006) Alert correlation survey: framework and techniques. In: Proceedings of the 2006 international conference on privacy, security and trust. Article no. 37
Jeon I-s, Han K-h, Kim D-w, Choi J-y (2015) Using the SIEM Software vulnerability detection model proposed. J Korea Inst Inf Secur Cryptology, pp 962–965
Idoia A, Sergio A (2012) Improving the automation of security information management: a collaborative approach. IEEE Secur Privacy 10(1):55–59
Alistair S (1998) Scenario-based requirements analysis. Requirements Eng 3(1):48–65
Manuel E, Theodoor S, Engin K, Christopher K (2012) A survey on automated dynamic malware-analysis techniques and tools. J ACM Comput Survey, pp 8-9
Alvaro A, Pratyusa K, Sreeranga P (2013) Big data analytics for security. IEEE Secur Privacy, pp 11-12
Matthias G, Michael F, Basel K, Adrian T, Ruth B, Alessandro M Anomaly Detection in the Cloud: Detecting Security Incidents via Machine Learning. International Workshop on Eternal Systems: EternalS 2012: Trustworthy Eternal Systems via Evolving Software Data and Knowledge. 103-116
Chen K-Y, Luesak L, Chou S-T (2007) Hot topic extraction based on timeline analysis and multidimensional sentence modeling. IEEE Trans Knowl Data Eng, pp 1023-1024
Canfora G, Ceccarelli M, Cerulo L, Di Penta M (2010) Using multivariate time series and association rules to detect logical change coupling: An empirical study. In: IEEE international conference on software maintenance (ICSM), vol 2010
Yunhong Z, Robert W, Pan S (2008) Large-scale parallel collaborative filtering for the netflix prize. In: International conference on algorithmic applications in management, pp 337–348
Sarwar B, Karypis G, Konstan J, Riedl J (2001) Item-based collaborative filtering recommendation algorithms. In: Proceeding WWW ’01 Proceedings of the 10th international conference on World Wide Web. ACM, New York, pp 285–295
Linden G, Smith B, York J (2003) https://www.Amazon.com recommenda-tions: item-to-item collaborative filtering. IEEE Internet Comput, pp 78-79
Lops P, de Gemmis M, Semeraro G (2010) Content-based recommender systems: state of the art and trends, recommender systems handbook, pp 73–105
Fang S, Xu LD, Zhu Y, Ahati J, Pei H, Yan J, Liu Z (2014) An integrated system for regional environmental monitoring and management based on internet of things. IEEE Trans Ind Inf 10(2):1596
Cisco (2013) The Internet of Everything for Cities: Connecting People, Process, Data, and Things To Improve the ‘Livability’ of Cities and Communities, Cisco Point of View Report. http://docbox.etsi.org/Workshop/2013/201306_SMARTCITIES/S03_SmartintheCity/CISCO_andriantsiferana.pdf
Zhu J, Chan DS, Prabhu MS, Natarajan P, Hu H, Bonomi F (2013) Improving Web Sites Performance Using Edge Servers in Fog Computing Architecture. In Service Oriented System Engineering (SOSE)
Gubbi J, Buyya R, Marusic S, Palaniswami M (2013) Ioe (IoE): a vision architectural elements and future directions. Futur Gener Comput Syst 29(7):1645–1660
(2016) Common vulnerability scoring system 3.0, Recommendation ITU-T X.1521, 03
IEEE-Standards (2016) Cherry Tom, security AND IOT IN IEEE standards
Acknowledgements
This work was supported by the National Research Foundation of Korea(NRF) grant funded by the Korea government(MSIT) (No. NRF-2017R1E1A1A01075110)
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This article is part of the Topical Collection: Special Issue on IoT System Technologies based on Quality of Experience
Guest Editors: Cho Jaeik, Naveen Chilamkurti, and SJ Wang
Rights and permissions
About this article
Cite this article
Son, D., Huh, S., Lee, T. et al. Internet of things system technologies based on quality of experience. Peer-to-Peer Netw. Appl. 13, 475–488 (2020). https://doi.org/10.1007/s12083-019-00727-1
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-019-00727-1