Next Article in Journal
UWB/Binocular VO Fusion Algorithm Based on Adaptive Kalman Filter
Next Article in Special Issue
A Quality of Service-Aware Secured Communication Scheme for Internet of Things-Based Networks
Previous Article in Journal
Empirical Formulas for Estimating Backscattering and Absorption Coefficients in Complex Waters from Remote-Sensing Reflectance Spectra and Examples of Their Application
Previous Article in Special Issue
Heuristic Approaches for Enhancing the Privacy of the Leader in IoT Networks
Article

Cyber Situation Comprehension for IoT Systems based on APT Alerts and Logs Correlation

by 1,2, 1,2 and 1,2,*
1
College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 211106, China
2
The Collaborative Innovation Center of Novel Software Technology and Industrialization, Nanjing 210023, China
*
Author to whom correspondence should be addressed.
Sensors 2019, 19(18), 4045; https://doi.org/10.3390/s19184045
Received: 23 July 2019 / Revised: 28 August 2019 / Accepted: 16 September 2019 / Published: 19 September 2019
(This article belongs to the Special Issue Threat Identification and Defence for Internet-of-Things)
With the emergence of the Advanced Persistent Threat (APT) attacks, many Internet of Things (IoT) systems have faced large numbers of potential threats with the characteristics of concealment, permeability, and pertinence. However, existing methods and technologies cannot provide comprehensive and prompt recognition of latent APT attack activities in the IoT systems. To address this problem, we propose an APT Alerts and Logs Correlation Method, named APTALCM and a framework of deploying APTALCM on the IoT system, where an edge computing architecture was used to achieve cyber situation comprehension without too much data transmission cost. Specifically, we firstly present a cyber situation ontology for modeling the concepts and properties to formalize APT attack activities in the IoT systems. Then, we introduce a cyber situation instance similarity measurement method based on the SimRank mechanism for APT alerts and logs Correlation. Combining with instance similarity, we further propose an APT alert instances correlation method to reconstruct APT attack scenarios and an APT log instances correlation method to detect log instance communities. Through the coalescence of these methods, APTALCM can accomplish the cyber situation comprehension effectively by recognizing the APT attack intentions in the IoT systems. The exhaustive experimental results demonstrate that the two kernel modules, i.e., Alert Instance Correlation Module (AICM) and Log Instance Correlation Module (LICM) in our APTALCM, can achieve both high true-positive rate and low false-positive rate. View Full-Text
Keywords: cyber situation comprehension; APT attack; alert correlation; log correlation; IoT; edge computing cyber situation comprehension; APT attack; alert correlation; log correlation; IoT; edge computing
Show Figures

Figure 1

MDPI and ACS Style

Cheng, X.; Zhang, J.; Chen, B. Cyber Situation Comprehension for IoT Systems based on APT Alerts and Logs Correlation. Sensors 2019, 19, 4045. https://doi.org/10.3390/s19184045

AMA Style

Cheng X, Zhang J, Chen B. Cyber Situation Comprehension for IoT Systems based on APT Alerts and Logs Correlation. Sensors. 2019; 19(18):4045. https://doi.org/10.3390/s19184045

Chicago/Turabian Style

Cheng, Xiang, Jiale Zhang, and Bing Chen. 2019. "Cyber Situation Comprehension for IoT Systems based on APT Alerts and Logs Correlation" Sensors 19, no. 18: 4045. https://doi.org/10.3390/s19184045

Find Other Styles
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop