CTIoT: A Cyber Threat Intelligence Tool for IoT

被引:1
作者
El Jaouhari, Saad [1 ]
Ahmed, Shaikh [1 ,2 ]
机构
[1] Inst Super Elect Paris Isep, Issy Les Moulinaux, France
[2] Rhine Waal Univ, Kleve, Germany
来源
20TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE, IWCMC 2024 | 2024年
关键词
Cyber Threat Intelligence; IoT; Security; CTI; Smart Spaces; Devices; Vulnerabilities; Threats; Feeds; Sources;
D O I
10.1109/IWCMC61514.2024.10592406
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The Internet of Things (IoT) has enabled intelligent services and revolutionized industries due to its sensing, actuating, and connectivity capabilities. However, this rapid expansion has also led to a surge of various types of vulnerabilities, posing significant challenges to the security and integrity of IoT ecosystems. The increasing number of vulnerabilities in IoT is explained by factors such as limited processing power and constrained resources, making them easy targets for cyberattacks. In this context, Cyber Threat Intelligence (CTI) plays a crucial role in providing actionable intelligence to identify, detect, and respond to threats targeting IoT infrastructure. Through threat intelligence feeds, analysis of indicators of compromise (IoCs), and proactive threat hunting, CTI enables organizations to enhance their situational awareness and strengthen their defenses against IoT-related threats. This paper proposes Cyber Threat Intelligence for IoT (CTIoT), a solution that effectively leverages CTI information to enhance IoT security. It actively and automatically collects and processes CTI data from heterogeneous sources, using Natural Language Processing (NLP) to identify vulnerabilities and threats related to IoT. The information is then presented in graph format that can be used by Graph Machine Learning to predict and detect cyberattacks. The proof of concept demonstrates the ability of our solution to monitor CTI data related to multiple IoT smart spaces with multiple IoT devices.
引用
收藏
页码:1483 / 1489
页数:7
相关论文
共 27 条
[1]  
Ammi Meryem, 2022, International Journal of Cloud Applications and Computing, V12, P1, DOI 10.4018/IJCAC.300770
[2]  
[Anonymous], 2024, Mindmajix IoT Devices Page
[3]  
Babu B. S., 2017, International Journal of Engineering Trends and Technology (IJETT), V43, P185
[4]   Methodological Framework to Collect, Process, Analyze and Visualize Cyber Threat Intelligence Data [J].
Borges Amaro, Lucas Jose ;
Percilio Azevedo, Bruce William ;
Lopes de Mendonca, Fabio Lucio ;
Giozza, William Ferreira ;
Albuquerque, Robson de Oliveira ;
Garcia Villalba, Luis Javier .
APPLIED SCIENCES-BASEL, 2022, 12 (03)
[5]  
Bright Cloud, About Us
[6]  
Czekster RM, 2022, Arxiv, DOI arXiv:2204.03676
[7]  
Dutta A., 2021, P INT C ELECT COMPUT, P1, DOI [10.1109/ICECCME52200.2021.9590959, DOI 10.1109/ICECCME52200.2021.9590959]
[8]  
EclecticIQ, About Us
[9]   SDN-based security management of multiple WoT Smart Spaces [J].
El Jaouhari, Saad ;
Bouabdallah, Ahmed ;
Corici, Andreea Ancuta .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (10) :9081-9096
[10]  
github, MISP