A Hybrid Alarm Association Method Based on AP Clustering and Causality

Internet of Things (IoT) brought great convenience to people’s daily lives. Meanwhile, the IoT devices are facing severe attacks from hackers and malicious attackers. Hackers and malicious attackers use various methods to invade the Internet of Things system, causing the Internet of Things to face a...

Full description

Bibliographic Details
Main Authors: Xiao-ling Tao, Lan Shi, Feng Zhao, Shen Lu, Yang Peng
Format: Article
Language:English
Published: Hindawi-Wiley 2021-01-01
Series:Wireless Communications and Mobile Computing
Online Access:http://dx.doi.org/10.1155/2021/5576504
id doaj-e6e41ae1efb548db840f00bc039ac376
record_format Article
spelling doaj-e6e41ae1efb548db840f00bc039ac3762021-04-12T01:23:51ZengHindawi-WileyWireless Communications and Mobile Computing1530-86772021-01-01202110.1155/2021/5576504A Hybrid Alarm Association Method Based on AP Clustering and CausalityXiao-ling Tao0Lan Shi1Feng Zhao2Shen Lu3Yang Peng4Guangxi Key Laboratory of Cryptography and Information SecurityGuangxi Key Laboratory of Cryptography and Information SecuritySchool of Information and CommunicationGuangxi Key Laboratory of Cryptography and Information SecurityGuangxi Key Laboratory of Cryptography and Information SecurityInternet of Things (IoT) brought great convenience to people’s daily lives. Meanwhile, the IoT devices are facing severe attacks from hackers and malicious attackers. Hackers and malicious attackers use various methods to invade the Internet of Things system, causing the Internet of Things to face a large number of targeted, concealed, and penetrating potential threats, which makes the privacy problem of the Internet of Things suffers serious challenges. But the existing methods and technologies cannot fully identify the attacker’s attack process and protect the privacy of the Internet of Things. Alarm correlation method can construct a complete attack scenario and identify the attacker’s intention by alarming the alarm data which provides an effective protection for user privacy. However, the existing alarm correlation methods still have the disadvantages of low correlation accuracy, poor correlation efficiency, and strong dependence on the knowledge base. To address these issues, we propose an alarm correlation method based on Affinity Propagation (AP) clustering algorithm and causal relationship. Our method considers that the alarm data triggered by the same attack process has high similarity characteristics, adopts the AP algorithm to improve the correlation efficiency, and at the same time constructs a complete attack process based on the causal correlation idea. The new alarm correlation method has a high correlation effect and builds a complete attack process to help managers identify attack intentions and prevent attacks.http://dx.doi.org/10.1155/2021/5576504
collection DOAJ
language English
format Article
sources DOAJ
author Xiao-ling Tao
Lan Shi
Feng Zhao
Shen Lu
Yang Peng
spellingShingle Xiao-ling Tao
Lan Shi
Feng Zhao
Shen Lu
Yang Peng
A Hybrid Alarm Association Method Based on AP Clustering and Causality
Wireless Communications and Mobile Computing
author_facet Xiao-ling Tao
Lan Shi
Feng Zhao
Shen Lu
Yang Peng
author_sort Xiao-ling Tao
title A Hybrid Alarm Association Method Based on AP Clustering and Causality
title_short A Hybrid Alarm Association Method Based on AP Clustering and Causality
title_full A Hybrid Alarm Association Method Based on AP Clustering and Causality
title_fullStr A Hybrid Alarm Association Method Based on AP Clustering and Causality
title_full_unstemmed A Hybrid Alarm Association Method Based on AP Clustering and Causality
title_sort hybrid alarm association method based on ap clustering and causality
publisher Hindawi-Wiley
series Wireless Communications and Mobile Computing
issn 1530-8677
publishDate 2021-01-01
description Internet of Things (IoT) brought great convenience to people’s daily lives. Meanwhile, the IoT devices are facing severe attacks from hackers and malicious attackers. Hackers and malicious attackers use various methods to invade the Internet of Things system, causing the Internet of Things to face a large number of targeted, concealed, and penetrating potential threats, which makes the privacy problem of the Internet of Things suffers serious challenges. But the existing methods and technologies cannot fully identify the attacker’s attack process and protect the privacy of the Internet of Things. Alarm correlation method can construct a complete attack scenario and identify the attacker’s intention by alarming the alarm data which provides an effective protection for user privacy. However, the existing alarm correlation methods still have the disadvantages of low correlation accuracy, poor correlation efficiency, and strong dependence on the knowledge base. To address these issues, we propose an alarm correlation method based on Affinity Propagation (AP) clustering algorithm and causal relationship. Our method considers that the alarm data triggered by the same attack process has high similarity characteristics, adopts the AP algorithm to improve the correlation efficiency, and at the same time constructs a complete attack process based on the causal correlation idea. The new alarm correlation method has a high correlation effect and builds a complete attack process to help managers identify attack intentions and prevent attacks.
url http://dx.doi.org/10.1155/2021/5576504
work_keys_str_mv AT xiaolingtao ahybridalarmassociationmethodbasedonapclusteringandcausality
AT lanshi ahybridalarmassociationmethodbasedonapclusteringandcausality
AT fengzhao ahybridalarmassociationmethodbasedonapclusteringandcausality
AT shenlu ahybridalarmassociationmethodbasedonapclusteringandcausality
AT yangpeng ahybridalarmassociationmethodbasedonapclusteringandcausality
AT xiaolingtao hybridalarmassociationmethodbasedonapclusteringandcausality
AT lanshi hybridalarmassociationmethodbasedonapclusteringandcausality
AT fengzhao hybridalarmassociationmethodbasedonapclusteringandcausality
AT shenlu hybridalarmassociationmethodbasedonapclusteringandcausality
AT yangpeng hybridalarmassociationmethodbasedonapclusteringandcausality
_version_ 1714683148638355456