A Process Mining Tool for Supporting IoT Security

被引:0
作者
Hemmer, Adrien [1 ]
Badonnel, Remi [1 ]
Francois, Jerome [1 ]
Chrisment, Isabelle [1 ]
机构
[1] Inria Nancy Grand Est LORIA, Campus Sci, F-54600 Villers Les Nancy, France
来源
NOMS 2020 - PROCEEDINGS OF THE 2020 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM 2020: MANAGEMENT IN THE AGE OF SOFTWARIZATION AND ARTIFICIAL INTELLIGENCE | 2020年
关键词
D O I
10.1109/noms47738.2020.9110254
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The development of the Internet has been characterized by a growing interest for the Internet-of-Things (IoT). In particular, connected devices are integrated to other Internet resources (such as cloud resources) to elaboratevalue-added services. However, they pose important challenges with respect to security management due to their heterogeneity, their distribution, and their limited resources. In this demonstration, we present a process mining toool for supporting IoT security. This tool is capable to automate the detection of misbehaviours and attacks in large and heterogeneous IoT infrastructures, based on process mining techniques combined with normalization and clustering data pre-processing. We detail the different building blocks of this tool provided into a docker container, and illustrate its operations with different scenarios.
引用
收藏
页数:2
相关论文
共 9 条
  • [1] Antonakakis M, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P1093
  • [2] Botnets and Internet of Things Security
    Bertino, Elisa
    Islam, Nayeem
    [J]. COMPUTER, 2017, 50 (02) : 76 - 79
  • [3] Bezerra F, 2009, LECT NOTES BUS INF P, V29, P149
  • [4] Delaney K., 2017, CONNECTED FUTURES CI
  • [5] Hemmer A., 2020, P NETW OP MAN S NOMS
  • [6] DDoS in the IoT: Mirai and Other Botnets
    Kolias, Constantinos
    Kambourakis, Georgios
    Stavrou, Angelos
    Voas, Jeffrey
    [J]. COMPUTER, 2017, 50 (07) : 80 - 84
  • [7] Pahl M.-O., 2018, 2018 28th international telecommunication networks and applications conference (ITNAC), P1
  • [8] Pedregosa F., 2011, J. Mach. Learn. Res, V12
  • [9] van Dongen BF, 2005, LECT NOTES COMPUT SC, V3536, P444