Cargando…
Cyber Situation Comprehension for IoT Systems based on APT Alerts and Logs Correlation
With the emergence of the Advanced Persistent Threat (APT) attacks, many Internet of Things (IoT) systems have faced large numbers of potential threats with the characteristics of concealment, permeability, and pertinence. However, existing methods and technologies cannot provide comprehensive and p...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2019
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6767330/ https://www.ncbi.nlm.nih.gov/pubmed/31546845 http://dx.doi.org/10.3390/s19184045 |
_version_ | 1783454892785926144 |
---|---|
author | Cheng, Xiang Zhang, Jiale Chen, Bing |
author_facet | Cheng, Xiang Zhang, Jiale Chen, Bing |
author_sort | Cheng, Xiang |
collection | PubMed |
description | With the emergence of the Advanced Persistent Threat (APT) attacks, many Internet of Things (IoT) systems have faced large numbers of potential threats with the characteristics of concealment, permeability, and pertinence. However, existing methods and technologies cannot provide comprehensive and prompt recognition of latent APT attack activities in the IoT systems. To address this problem, we propose an APT Alerts and Logs Correlation Method, named APTALCM and a framework of deploying APTALCM on the IoT system, where an edge computing architecture was used to achieve cyber situation comprehension without too much data transmission cost. Specifically, we firstly present a cyber situation ontology for modeling the concepts and properties to formalize APT attack activities in the IoT systems. Then, we introduce a cyber situation instance similarity measurement method based on the SimRank mechanism for APT alerts and logs Correlation. Combining with instance similarity, we further propose an APT alert instances correlation method to reconstruct APT attack scenarios and an APT log instances correlation method to detect log instance communities. Through the coalescence of these methods, APTALCM can accomplish the cyber situation comprehension effectively by recognizing the APT attack intentions in the IoT systems. The exhaustive experimental results demonstrate that the two kernel modules, i.e., Alert Instance Correlation Module (AICM) and Log Instance Correlation Module (LICM) in our APTALCM, can achieve both high true-positive rate and low false-positive rate. |
format | Online Article Text |
id | pubmed-6767330 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2019 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-67673302019-10-02 Cyber Situation Comprehension for IoT Systems based on APT Alerts and Logs Correlation Cheng, Xiang Zhang, Jiale Chen, Bing Sensors (Basel) Article With the emergence of the Advanced Persistent Threat (APT) attacks, many Internet of Things (IoT) systems have faced large numbers of potential threats with the characteristics of concealment, permeability, and pertinence. However, existing methods and technologies cannot provide comprehensive and prompt recognition of latent APT attack activities in the IoT systems. To address this problem, we propose an APT Alerts and Logs Correlation Method, named APTALCM and a framework of deploying APTALCM on the IoT system, where an edge computing architecture was used to achieve cyber situation comprehension without too much data transmission cost. Specifically, we firstly present a cyber situation ontology for modeling the concepts and properties to formalize APT attack activities in the IoT systems. Then, we introduce a cyber situation instance similarity measurement method based on the SimRank mechanism for APT alerts and logs Correlation. Combining with instance similarity, we further propose an APT alert instances correlation method to reconstruct APT attack scenarios and an APT log instances correlation method to detect log instance communities. Through the coalescence of these methods, APTALCM can accomplish the cyber situation comprehension effectively by recognizing the APT attack intentions in the IoT systems. The exhaustive experimental results demonstrate that the two kernel modules, i.e., Alert Instance Correlation Module (AICM) and Log Instance Correlation Module (LICM) in our APTALCM, can achieve both high true-positive rate and low false-positive rate. MDPI 2019-09-19 /pmc/articles/PMC6767330/ /pubmed/31546845 http://dx.doi.org/10.3390/s19184045 Text en © 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Cheng, Xiang Zhang, Jiale Chen, Bing Cyber Situation Comprehension for IoT Systems based on APT Alerts and Logs Correlation |
title | Cyber Situation Comprehension for IoT Systems based on APT Alerts and Logs Correlation |
title_full | Cyber Situation Comprehension for IoT Systems based on APT Alerts and Logs Correlation |
title_fullStr | Cyber Situation Comprehension for IoT Systems based on APT Alerts and Logs Correlation |
title_full_unstemmed | Cyber Situation Comprehension for IoT Systems based on APT Alerts and Logs Correlation |
title_short | Cyber Situation Comprehension for IoT Systems based on APT Alerts and Logs Correlation |
title_sort | cyber situation comprehension for iot systems based on apt alerts and logs correlation |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6767330/ https://www.ncbi.nlm.nih.gov/pubmed/31546845 http://dx.doi.org/10.3390/s19184045 |
work_keys_str_mv | AT chengxiang cybersituationcomprehensionforiotsystemsbasedonaptalertsandlogscorrelation AT zhangjiale cybersituationcomprehensionforiotsystemsbasedonaptalertsandlogscorrelation AT chenbing cybersituationcomprehensionforiotsystemsbasedonaptalertsandlogscorrelation |