Cargando…

Cyber Situation Comprehension for IoT Systems based on APT Alerts and Logs Correlation

With the emergence of the Advanced Persistent Threat (APT) attacks, many Internet of Things (IoT) systems have faced large numbers of potential threats with the characteristics of concealment, permeability, and pertinence. However, existing methods and technologies cannot provide comprehensive and p...

Descripción completa

Detalles Bibliográficos
Autores principales: Cheng, Xiang, Zhang, Jiale, Chen, Bing
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2019
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6767330/
https://www.ncbi.nlm.nih.gov/pubmed/31546845
http://dx.doi.org/10.3390/s19184045
_version_ 1783454892785926144
author Cheng, Xiang
Zhang, Jiale
Chen, Bing
author_facet Cheng, Xiang
Zhang, Jiale
Chen, Bing
author_sort Cheng, Xiang
collection PubMed
description With the emergence of the Advanced Persistent Threat (APT) attacks, many Internet of Things (IoT) systems have faced large numbers of potential threats with the characteristics of concealment, permeability, and pertinence. However, existing methods and technologies cannot provide comprehensive and prompt recognition of latent APT attack activities in the IoT systems. To address this problem, we propose an APT Alerts and Logs Correlation Method, named APTALCM and a framework of deploying APTALCM on the IoT system, where an edge computing architecture was used to achieve cyber situation comprehension without too much data transmission cost. Specifically, we firstly present a cyber situation ontology for modeling the concepts and properties to formalize APT attack activities in the IoT systems. Then, we introduce a cyber situation instance similarity measurement method based on the SimRank mechanism for APT alerts and logs Correlation. Combining with instance similarity, we further propose an APT alert instances correlation method to reconstruct APT attack scenarios and an APT log instances correlation method to detect log instance communities. Through the coalescence of these methods, APTALCM can accomplish the cyber situation comprehension effectively by recognizing the APT attack intentions in the IoT systems. The exhaustive experimental results demonstrate that the two kernel modules, i.e., Alert Instance Correlation Module (AICM) and Log Instance Correlation Module (LICM) in our APTALCM, can achieve both high true-positive rate and low false-positive rate.
format Online
Article
Text
id pubmed-6767330
institution National Center for Biotechnology Information
language English
publishDate 2019
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-67673302019-10-02 Cyber Situation Comprehension for IoT Systems based on APT Alerts and Logs Correlation Cheng, Xiang Zhang, Jiale Chen, Bing Sensors (Basel) Article With the emergence of the Advanced Persistent Threat (APT) attacks, many Internet of Things (IoT) systems have faced large numbers of potential threats with the characteristics of concealment, permeability, and pertinence. However, existing methods and technologies cannot provide comprehensive and prompt recognition of latent APT attack activities in the IoT systems. To address this problem, we propose an APT Alerts and Logs Correlation Method, named APTALCM and a framework of deploying APTALCM on the IoT system, where an edge computing architecture was used to achieve cyber situation comprehension without too much data transmission cost. Specifically, we firstly present a cyber situation ontology for modeling the concepts and properties to formalize APT attack activities in the IoT systems. Then, we introduce a cyber situation instance similarity measurement method based on the SimRank mechanism for APT alerts and logs Correlation. Combining with instance similarity, we further propose an APT alert instances correlation method to reconstruct APT attack scenarios and an APT log instances correlation method to detect log instance communities. Through the coalescence of these methods, APTALCM can accomplish the cyber situation comprehension effectively by recognizing the APT attack intentions in the IoT systems. The exhaustive experimental results demonstrate that the two kernel modules, i.e., Alert Instance Correlation Module (AICM) and Log Instance Correlation Module (LICM) in our APTALCM, can achieve both high true-positive rate and low false-positive rate. MDPI 2019-09-19 /pmc/articles/PMC6767330/ /pubmed/31546845 http://dx.doi.org/10.3390/s19184045 Text en © 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Cheng, Xiang
Zhang, Jiale
Chen, Bing
Cyber Situation Comprehension for IoT Systems based on APT Alerts and Logs Correlation
title Cyber Situation Comprehension for IoT Systems based on APT Alerts and Logs Correlation
title_full Cyber Situation Comprehension for IoT Systems based on APT Alerts and Logs Correlation
title_fullStr Cyber Situation Comprehension for IoT Systems based on APT Alerts and Logs Correlation
title_full_unstemmed Cyber Situation Comprehension for IoT Systems based on APT Alerts and Logs Correlation
title_short Cyber Situation Comprehension for IoT Systems based on APT Alerts and Logs Correlation
title_sort cyber situation comprehension for iot systems based on apt alerts and logs correlation
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6767330/
https://www.ncbi.nlm.nih.gov/pubmed/31546845
http://dx.doi.org/10.3390/s19184045
work_keys_str_mv AT chengxiang cybersituationcomprehensionforiotsystemsbasedonaptalertsandlogscorrelation
AT zhangjiale cybersituationcomprehensionforiotsystemsbasedonaptalertsandlogscorrelation
AT chenbing cybersituationcomprehensionforiotsystemsbasedonaptalertsandlogscorrelation