A Hybrid Alarm Association Method Based on AP Clustering and Causality
Internet of Things (IoT) brought great convenience to people’s daily lives. Meanwhile, the IoT devices are facing severe attacks from hackers and malicious attackers. Hackers and malicious attackers use various methods to invade the Internet of Things system, causing the Internet of Things to face a...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi-Wiley
2021-01-01
|
Series: | Wireless Communications and Mobile Computing |
Online Access: | http://dx.doi.org/10.1155/2021/5576504 |
id |
doaj-e6e41ae1efb548db840f00bc039ac376 |
---|---|
record_format |
Article |
spelling |
doaj-e6e41ae1efb548db840f00bc039ac3762021-04-12T01:23:51ZengHindawi-WileyWireless Communications and Mobile Computing1530-86772021-01-01202110.1155/2021/5576504A Hybrid Alarm Association Method Based on AP Clustering and CausalityXiao-ling Tao0Lan Shi1Feng Zhao2Shen Lu3Yang Peng4Guangxi Key Laboratory of Cryptography and Information SecurityGuangxi Key Laboratory of Cryptography and Information SecuritySchool of Information and CommunicationGuangxi Key Laboratory of Cryptography and Information SecurityGuangxi Key Laboratory of Cryptography and Information SecurityInternet of Things (IoT) brought great convenience to people’s daily lives. Meanwhile, the IoT devices are facing severe attacks from hackers and malicious attackers. Hackers and malicious attackers use various methods to invade the Internet of Things system, causing the Internet of Things to face a large number of targeted, concealed, and penetrating potential threats, which makes the privacy problem of the Internet of Things suffers serious challenges. But the existing methods and technologies cannot fully identify the attacker’s attack process and protect the privacy of the Internet of Things. Alarm correlation method can construct a complete attack scenario and identify the attacker’s intention by alarming the alarm data which provides an effective protection for user privacy. However, the existing alarm correlation methods still have the disadvantages of low correlation accuracy, poor correlation efficiency, and strong dependence on the knowledge base. To address these issues, we propose an alarm correlation method based on Affinity Propagation (AP) clustering algorithm and causal relationship. Our method considers that the alarm data triggered by the same attack process has high similarity characteristics, adopts the AP algorithm to improve the correlation efficiency, and at the same time constructs a complete attack process based on the causal correlation idea. The new alarm correlation method has a high correlation effect and builds a complete attack process to help managers identify attack intentions and prevent attacks.http://dx.doi.org/10.1155/2021/5576504 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Xiao-ling Tao Lan Shi Feng Zhao Shen Lu Yang Peng |
spellingShingle |
Xiao-ling Tao Lan Shi Feng Zhao Shen Lu Yang Peng A Hybrid Alarm Association Method Based on AP Clustering and Causality Wireless Communications and Mobile Computing |
author_facet |
Xiao-ling Tao Lan Shi Feng Zhao Shen Lu Yang Peng |
author_sort |
Xiao-ling Tao |
title |
A Hybrid Alarm Association Method Based on AP Clustering and Causality |
title_short |
A Hybrid Alarm Association Method Based on AP Clustering and Causality |
title_full |
A Hybrid Alarm Association Method Based on AP Clustering and Causality |
title_fullStr |
A Hybrid Alarm Association Method Based on AP Clustering and Causality |
title_full_unstemmed |
A Hybrid Alarm Association Method Based on AP Clustering and Causality |
title_sort |
hybrid alarm association method based on ap clustering and causality |
publisher |
Hindawi-Wiley |
series |
Wireless Communications and Mobile Computing |
issn |
1530-8677 |
publishDate |
2021-01-01 |
description |
Internet of Things (IoT) brought great convenience to people’s daily lives. Meanwhile, the IoT devices are facing severe attacks from hackers and malicious attackers. Hackers and malicious attackers use various methods to invade the Internet of Things system, causing the Internet of Things to face a large number of targeted, concealed, and penetrating potential threats, which makes the privacy problem of the Internet of Things suffers serious challenges. But the existing methods and technologies cannot fully identify the attacker’s attack process and protect the privacy of the Internet of Things. Alarm correlation method can construct a complete attack scenario and identify the attacker’s intention by alarming the alarm data which provides an effective protection for user privacy. However, the existing alarm correlation methods still have the disadvantages of low correlation accuracy, poor correlation efficiency, and strong dependence on the knowledge base. To address these issues, we propose an alarm correlation method based on Affinity Propagation (AP) clustering algorithm and causal relationship. Our method considers that the alarm data triggered by the same attack process has high similarity characteristics, adopts the AP algorithm to improve the correlation efficiency, and at the same time constructs a complete attack process based on the causal correlation idea. The new alarm correlation method has a high correlation effect and builds a complete attack process to help managers identify attack intentions and prevent attacks. |
url |
http://dx.doi.org/10.1155/2021/5576504 |
work_keys_str_mv |
AT xiaolingtao ahybridalarmassociationmethodbasedonapclusteringandcausality AT lanshi ahybridalarmassociationmethodbasedonapclusteringandcausality AT fengzhao ahybridalarmassociationmethodbasedonapclusteringandcausality AT shenlu ahybridalarmassociationmethodbasedonapclusteringandcausality AT yangpeng ahybridalarmassociationmethodbasedonapclusteringandcausality AT xiaolingtao hybridalarmassociationmethodbasedonapclusteringandcausality AT lanshi hybridalarmassociationmethodbasedonapclusteringandcausality AT fengzhao hybridalarmassociationmethodbasedonapclusteringandcausality AT shenlu hybridalarmassociationmethodbasedonapclusteringandcausality AT yangpeng hybridalarmassociationmethodbasedonapclusteringandcausality |
_version_ |
1714683148638355456 |