Title
IoT Attacks: Features Identification and Clustering
Abstract
The exponential growth in the Internet of Things (IoT) market has led to the proliferation of cyber threats as millions of vulnerable IoT devices are connected to the Internet each year. Security practitioners and researchers capture attacks on IoT devices using honeypots to explore the attack process, identify the types of attacks and analyse the interaction of the attackers with IoT devices. Several studies have focused on the classification of attacks on IoT devices, however, they are limited to performing manual analysis on command data by assigning skill levels to the attackers and looking at the purpose of executing specific commands. In this paper, we report our analysis of the captured attacks on IoT devices for four months using a medium-interaction server honeypot. We extract a new feature set by analysing the attacks according to the depth of interaction by the attackers, their behaviour in the attack process and the resources they utilised to perform these attacks. We apply unsupervised learning (i.e. clustering) to automatically group captured attacks and build a model to highlight the important features that contribute to understanding the relationship between various attacks grouped in the same cluster.
Year
DOI
Venue
2020
10.1109/TrustCom50675.2020.00056
2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
Keywords
DocType
ISSN
Attacks on IoT Devices,Feature Extraction,Clustering,Random Tree,Machine Learning
Conference
2324-898X
ISBN
Citations 
PageRank 
978-1-6654-0393-1
0
0.34
References 
Authors
0
4
Name
Order
Citations
PageRank
Junaid Haseeb111.71
Masood Mansoori200.68
Harith Al-Sahaf300.68
Ian S. Welch412018.53