Investigating Brute Force Attack Patterns in IoT Network

Published on Apr 1, 2019in Journal of Electrical and Computer Engineering
路 DOI :10.1155/2019/4568368
Deris Stiawan10
Estimated H-index: 10
Mohammad Yazid Bin Idris4
Estimated H-index: 4
(UTM: Universiti Teknologi Malaysia)
+ 3 AuthorsRahmat Budiarto13
Estimated H-index: 13
(Al Baha University)
Internet of Things (IoT) devices may transfer data to the gateway/application server through File Transfer Protocol (FTP) transaction. Unfortunately, in terms of security, the FTP server at a gateway or data sink very often is improperly set up. At the same time, password matching/theft holding is among the popular attacks as the intruders attack the IoT network. Thus, this paper attempts to provide an insight of this type of attack with the main aim of coming up with attack patterns that may help the IoT system administrator to analyze any similar attacks. This paper investigates brute force attack (BFA) on the FTP server of the IoT network by using a time-sensitive statistical relationship approach and visualizing the attack patterns that identify its configurations. The investigation focuses on attacks launched from the internal network, due to the assumption that the IoT network has already installed a firewall. An insider/internal attack launched from an internal network endangers more the entire IoT security system. The experiments use the IoT network testbed that mimic the internal attack scenario with three major goals: (i) to provide a topological description on how an insider attack occurs; (ii) to achieve attack pattern extraction from raw sniffed data; and (iii) to establish attack pattern identification as a parameter to visualize real-time attacks. Experimental results validate the investigation.
馃摉 Papers frequently viewed together
8 Authors (Donglan Liu, ..., Lei Ma)
4 Authors (Duhoe Kim, ..., Dongkyoo Shin)
#1Arbia Riahi Sfar (University of Paris)H-Index: 3
#2Enrico Natalizio (University of Paris)H-Index: 22
Last. Zied Chtourou (Military Academy)H-Index: 11
view all 4 authors...
Unquestionably, communicating entities (objects, or things) in the Internet of Things (IoT) context, are acquiring an active role in human activities, systems and processes. The high connectivity of intelligent objects and their severe constraints lead to many security challenges, which are not included into the classical formulation of security problems and solutions. "Security Shield for Internet of Things" has been identified by DARPA (Defense Advanced Research Projects Agency) as one of the ...
#1Hao Zhang (VT: Virginia Tech)H-Index: 5
#2Danfeng Yao (VT: Virginia Tech)H-Index: 32
Last. Zhibin Zhang (CAS: Chinese Academy of Sciences)H-Index: 25
view all 4 authors...
Malicious software activities have become more and more clandestine, making them challenging to detect. Existing security solutions rely heavily on the recognition of known code or behavior signatures, which are incapable of detecting new malware patterns. We propose to discover the triggering relations on network requests and leverage the structural information to identify stealthy malware activities that cannot be attributed to a legitimate cause. The triggering relation is defined as the temp...
#1Mohammad GhasemiGol (FUM: Ferdowsi University of Mashhad)H-Index: 11
#2Abbas Ghaemi-Bafghi (FUM: Ferdowsi University of Mashhad)H-Index: 5
Last. Hassan Takabi (UNT: University of North Texas)H-Index: 17
view all 3 authors...
We modify the attack graph to handle the uncertainty of attack probabilities.We analyze the IDS alerts and intrusion responses to update the attack probabilities.We define a forecasting attack graph to predict future attacks.The forecasting attack graph provides a high-level insight into the network security. Forecasting future attacks is a big challenge for network administrators because future is generally unknown. Nevertheless, some information about the future can help us make better decisio...
#1Boris Sieklik (Edinburgh Napier University)H-Index: 1
#2Richard Macfarlane (Edinburgh Napier University)H-Index: 8
Last. William J Buchanan (Edinburgh Napier University)H-Index: 22
view all 3 authors...
Web threats are becoming a major issue for both governments and companies. Generally, web threats increased as much as 600% during last year (WebSense, 2013). This appears to be a significant issue, since many major businesses seem to provide these services. Denial of Service (DoS) attacks are one of the most significant web threats and generally their aim is to waste the resources of the target machine (Mirkovic & Reiher, 2004). Distributed Denial of Service (DDoS) attacks are typically execute...
#1Deris StiawanH-Index: 10
Last. Rahmat Budiarto (Al Baha University)H-Index: 13
view all 5 authors...
Along with the evolution of Internet and its new emerging services, the quantity and impact of attacks have been continuously increasing. Currently, the technical capability to attack has tended to decrease. On the contrary, performances of hacking tools are evolving, growing, simple, comprehensive, and accessible to the public. In this work, network penetration testing and auditing of the Redhat operating system (OS) are highlighted as one of the most popular OS for Internet applications. Some ...
#1Abhishek Joshi (Graphic Era University)H-Index: 1
#2Mohammad Wazid (IIIT-H: International Institute of Information Technology, Hyderabad)H-Index: 29
Last. R. H. Goudar (Visvesvaraya Technological University)H-Index: 12
view all 3 authors...
Abstract Security is the biggest concern for any information transferred in the world of Internet. Sometimes sensitive information is communicated via insecure medium so various attacks like Brute force, Crypt analytic are possible for recovering message and key. In recent years, encryption technology has been developed very quickly to secure the transmitted information. Existing techniques have separate mechanism for key distribution and for encryption and decryption at source and destination. ...
#1Sherali Zeadally (UK: University of Kentucky)H-Index: 73
#2Angelyn Flowers (UDC: University of the District of Columbia)H-Index: 4
Cyberwar is insidious, invisible to most, and is fought out of sight. It takes place in cyberspace, a location that cannot be seen, touched, nor felt. Cyberspace has been defined as the fifth domain of war. We can see the physical instruments, such as computers, routers, cables, however these instruments interact in a virtual and unseen realm. This facilitates a reach that can extend from one part of the world to attacks on public or private sector entities in another part of the world, while th...
#1Julian Jang-Jaccard (CSIRO: Commonwealth Scientific and Industrial Research Organisation)H-Index: 11
#2Surya Nepal (CSIRO: Commonwealth Scientific and Industrial Research Organisation)H-Index: 39
Abstract The exponential growth of the Internet interconnections has led to a significant growth of cyber attack incidents often with disastrous and grievous consequences. Malware is the primary choice of weapon to carry out malicious intents in the cyberspace, either by exploitation into existing vulnerabilities or utilization of unique characteristics of emerging technologies. The development of more innovative and effective malware defense mechanisms has been regarded as an urgent requirement...
#1Andrew Austin (NCSU: North Carolina State University)H-Index: 5
#2Casper Holmgreen (NCSU: North Carolina State University)H-Index: 2
Last. Laurie Williams (NCSU: North Carolina State University)H-Index: 71
view all 3 authors...
Abstract Context Security vulnerabilities discovered later in the development cycle are more expensive to fix than those discovered early. Therefore, software developers should strive to discover vulnerabilities as early as possible. Unfortunately, the large size of code bases and lack of developer expertise can make discovering software vulnerabilities difficult. A number of vulnerability discovery techniques are available, each with their own strengths. Objective The objective of this research...
Cited By18
#1Fountas PanagiotisH-Index: 1
Last. Mohamed Amine FerragH-Index: 19
view all 5 authors...
Over the years, the digitization of all aspects of life in modern societies is considered an acquired advantage. However, like the terrestrial world, the digital world is not perfect and many dangers and threats are present. In the present work, we conduct a systematic review on the methods of network detection and cyber attacks that can take place in a critical infrastructure. As is shown, the implementation of a system that learns from the system behavior (machine learning), on multiple levels...
#2Valeria LoscriH-Index: 19
Last. Nathalie MittonH-Index: 24
view all 3 authors...
#2Roberto Mag谩n-Carri贸n (UGR: University of Granada)H-Index: 8
view all 4 authors...
Abstract Nowadays with the fast development of IT鈥檚 technologies, new services and applications improved people鈥檚 daily life. They are supported by tons of devices that are continuously sharing huge and heterogeneous data. In this challenging scenario, security issues are increasing and several threats arise where network communications and systems are targeted for attacks. In order to counteract against them, new tools and methods need to be proposed. The Multivariate Statistical Network Monito...
#1Yesi Novaria Kunang (Sriwijaya University)H-Index: 5
#2Siti Nurmaini (Sriwijaya University)H-Index: 12
Last. Bhakti Yudho SupraptoH-Index: 4
view all 4 authors...
Abstract A network intrusion detection system (NIDS) is a solution that mitigates the threat of attacks on a network. The success of a NIDS depends on the success of its algorithm and the performance of its method in recognizing attacks. We propose a deep learning intrusion detection system (IDS) using a pretraining approach with deep autoencoder (PTDAE) combined with a deep neural network (DNN). Models were developed using hyperparameter optimization procedures. This research provides an altern...
Command, Control, Communication, and Intelligence (C3I) system is a kind of system-of-system that integrates computing machines, sensors, and communication networks. C3I systems are increasingly used in critical civil and military operations for achieving information superiority, assurance, and operational efficacy. C3I systems are no exception to the traditional systems facing widespread cyber-threats. However, the sensitive nature of the application domain (e.g., military operations) of C3I sy...
#1Jan StodtH-Index: 4
#2Daniel SchOnleH-Index: 2
Last. Axel SikoraH-Index: 15
view all 6 authors...
In recent years, both the Internet of Things (IoT) and blockchain technologies have been highly influential and revolutionary. IoT enables companies to embrace Industry 4.0, the Fourth Industrial Revolution, which benefits from communication and connectivity to reduce cost and to increase productivity through sensor-based autonomy. These automated systems can be further refined with smart contracts that are executed within a blockchain, thereby increasing transparency through continuous and indi...
#1Ilhan Firat Kilincer (F谋rat University)H-Index: 3
#2Fatih Ertam (F谋rat University)H-Index: 10
Last. Abdulkadir Sengur (F谋rat University)H-Index: 35
view all 3 authors...
Abstract The increase in internet usage brings security problems with it. Malicious software can affect the operation of the systems and disrupt data confidentiality due to the security gaps in the systems. Intrusion Detection Systems (IDS) have been developed to detect and report attacks. In order to develop IDS systems, artificial intelligence-based approaches have been used more frequently. In this study, literature studies using CSE-CIC IDS-2018, UNSW-NB15, ISCX-2012, NSL-KDD and CIDDS-001 d...
Internet-of-Things or IoT technology becomes essential in everyday lives. The risk of security and privacy towards IoT devices, especially smarthomes IoT gateway device, becoming apparent as IoT technology progressed. The need for affordable, secure smarthome gateway device or router that smarthome user prefer. The problem of low-performance smarthome gateways was running security programs on top of smarthome gateway programs. This problem motivates the researcher designing a secure and efficien...
#1Shilan S. Hameed (UTM: Universiti Teknologi Malaysia)H-Index: 5
#2Wan Haslina Hassan (UTM: Universiti Teknologi Malaysia)H-Index: 11
Last. Fahad Ghabban (Taibah University)H-Index: 4
view all 4 authors...
Background The Internet of Medical Things (IoMTs) is gradually replacing the traditional healthcare system. However, little attention has been paid to their security requirements in the development of the IoMT devices and systems. One of the main reasons can be the difficulty of tuning conventional security solutions to the IoMT system. Machine Learning (ML) has been successfully employed in the attack detection and mitigation process. Advanced ML technique can also be a promising approach to ad...
Internet of Things (IoT) is an emerging technology that makes people鈥檚 lives smart by conquering a plethora of diverse application and service areas. In near future, the fifth-generation (5G) wireless networks provide the connectivity for this IoT ecosystem. It has been carefully designed to facilitate the exponential growth in the IoT field. Network slicing is one of the key technologies in the 5G architecture that has the ability to divide the physical network into multiple logical networks (i...
This website uses cookies.
We use cookies to improve your online experience. By continuing to use our website we assume you agree to the placement of these cookies.
To learn more, you can find in our Privacy Policy.