Skip to main content
Top
Published in: Peer-to-Peer Networking and Applications 2/2020

28-03-2019

Internet of things system technologies based on quality of experience

Authors: Dongsik Son, Seungpyo Huh, Taejin Lee, Jin Kwak

Published in: Peer-to-Peer Networking and Applications | Issue 2/2020

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

With rapid development of IOT technology, QOE is considered in design process to ensure that end users are satisfied using IOT applications and System. However, as if to mock this new paradigm, hackers in the cyber world are attacking the subjective acceptability of an IOT application perceived by the end user through intelligent cyber threats such as DDoS attacks, wiretapping, remote control, ID/Password hijacking using IOT devices. Due to this, the number of SIEM introduction is increasing in order to detect threat patterns in a short period of time with a large amount of structured/unstructured data from IOT devices, to precisely diagnose crisis to threats, and to provide an accurate alarm to an administrator by correlating collected information. In this paper, we design and propose an automated profiling model that leverages the analysis results of the IOT event profiling in SIEM to improve attack detection, efficiency and speed against potential threats.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
3.
go back to reference Andrey F, Igor K, Didier E (2017) Correlation of security events based on the analysis of structures of event types. Intelligent Data Acquisition and Advanced Computing Systems, IEEE Andrey F, Igor K, Didier E (2017) Correlation of security events based on the analysis of structures of event types. Intelligent Data Acquisition and Advanced Computing Systems, IEEE
4.
go back to reference Gartner Magic Quadrant (2016) Magic Quadrant for Security Information and Event Management, 3 Gartner Magic Quadrant (2016) Magic Quadrant for Security Information and Event Management, 3
5.
go back to reference Reza S, Ali G (2006) Alert correlation survey: framework and techniques. In: Proceedings of the 2006 international conference on privacy, security and trust. Article no. 37 Reza S, Ali G (2006) Alert correlation survey: framework and techniques. In: Proceedings of the 2006 international conference on privacy, security and trust. Article no. 37
6.
go back to reference Jeon I-s, Han K-h, Kim D-w, Choi J-y (2015) Using the SIEM Software vulnerability detection model proposed. J Korea Inst Inf Secur Cryptology, pp 962–965 Jeon I-s, Han K-h, Kim D-w, Choi J-y (2015) Using the SIEM Software vulnerability detection model proposed. J Korea Inst Inf Secur Cryptology, pp 962–965
7.
go back to reference Idoia A, Sergio A (2012) Improving the automation of security information management: a collaborative approach. IEEE Secur Privacy 10(1):55–59CrossRef Idoia A, Sergio A (2012) Improving the automation of security information management: a collaborative approach. IEEE Secur Privacy 10(1):55–59CrossRef
8.
go back to reference Alistair S (1998) Scenario-based requirements analysis. Requirements Eng 3(1):48–65CrossRef Alistair S (1998) Scenario-based requirements analysis. Requirements Eng 3(1):48–65CrossRef
9.
go back to reference Manuel E, Theodoor S, Engin K, Christopher K (2012) A survey on automated dynamic malware-analysis techniques and tools. J ACM Comput Survey, pp 8-9 Manuel E, Theodoor S, Engin K, Christopher K (2012) A survey on automated dynamic malware-analysis techniques and tools. J ACM Comput Survey, pp 8-9
10.
go back to reference Alvaro A, Pratyusa K, Sreeranga P (2013) Big data analytics for security. IEEE Secur Privacy, pp 11-12 Alvaro A, Pratyusa K, Sreeranga P (2013) Big data analytics for security. IEEE Secur Privacy, pp 11-12
11.
go back to reference Matthias G, Michael F, Basel K, Adrian T, Ruth B, Alessandro M Anomaly Detection in the Cloud: Detecting Security Incidents via Machine Learning. International Workshop on Eternal Systems: EternalS 2012: Trustworthy Eternal Systems via Evolving Software Data and Knowledge. 103-116 Matthias G, Michael F, Basel K, Adrian T, Ruth B, Alessandro M Anomaly Detection in the Cloud: Detecting Security Incidents via Machine Learning. International Workshop on Eternal Systems: EternalS 2012: Trustworthy Eternal Systems via Evolving Software Data and Knowledge. 103-116
12.
go back to reference Chen K-Y, Luesak L, Chou S-T (2007) Hot topic extraction based on timeline analysis and multidimensional sentence modeling. IEEE Trans Knowl Data Eng, pp 1023-1024 Chen K-Y, Luesak L, Chou S-T (2007) Hot topic extraction based on timeline analysis and multidimensional sentence modeling. IEEE Trans Knowl Data Eng, pp 1023-1024
13.
go back to reference Canfora G, Ceccarelli M, Cerulo L, Di Penta M (2010) Using multivariate time series and association rules to detect logical change coupling: An empirical study. In: IEEE international conference on software maintenance (ICSM), vol 2010 Canfora G, Ceccarelli M, Cerulo L, Di Penta M (2010) Using multivariate time series and association rules to detect logical change coupling: An empirical study. In: IEEE international conference on software maintenance (ICSM), vol 2010
14.
go back to reference Yunhong Z, Robert W, Pan S (2008) Large-scale parallel collaborative filtering for the netflix prize. In: International conference on algorithmic applications in management, pp 337–348 Yunhong Z, Robert W, Pan S (2008) Large-scale parallel collaborative filtering for the netflix prize. In: International conference on algorithmic applications in management, pp 337–348
15.
go back to reference Sarwar B, Karypis G, Konstan J, Riedl J (2001) Item-based collaborative filtering recommendation algorithms. In: Proceeding WWW ’01 Proceedings of the 10th international conference on World Wide Web. ACM, New York, pp 285–295 Sarwar B, Karypis G, Konstan J, Riedl J (2001) Item-based collaborative filtering recommendation algorithms. In: Proceeding WWW ’01 Proceedings of the 10th international conference on World Wide Web. ACM, New York, pp 285–295
17.
go back to reference Lops P, de Gemmis M, Semeraro G (2010) Content-based recommender systems: state of the art and trends, recommender systems handbook, pp 73–105 Lops P, de Gemmis M, Semeraro G (2010) Content-based recommender systems: state of the art and trends, recommender systems handbook, pp 73–105
18.
go back to reference Fang S, Xu LD, Zhu Y, Ahati J, Pei H, Yan J, Liu Z (2014) An integrated system for regional environmental monitoring and management based on internet of things. IEEE Trans Ind Inf 10(2):1596CrossRef Fang S, Xu LD, Zhu Y, Ahati J, Pei H, Yan J, Liu Z (2014) An integrated system for regional environmental monitoring and management based on internet of things. IEEE Trans Ind Inf 10(2):1596CrossRef
20.
go back to reference Zhu J, Chan DS, Prabhu MS, Natarajan P, Hu H, Bonomi F (2013) Improving Web Sites Performance Using Edge Servers in Fog Computing Architecture. In Service Oriented System Engineering (SOSE) Zhu J, Chan DS, Prabhu MS, Natarajan P, Hu H, Bonomi F (2013) Improving Web Sites Performance Using Edge Servers in Fog Computing Architecture. In Service Oriented System Engineering (SOSE)
21.
go back to reference Gubbi J, Buyya R, Marusic S, Palaniswami M (2013) Ioe (IoE): a vision architectural elements and future directions. Futur Gener Comput Syst 29(7):1645–1660CrossRef Gubbi J, Buyya R, Marusic S, Palaniswami M (2013) Ioe (IoE): a vision architectural elements and future directions. Futur Gener Comput Syst 29(7):1645–1660CrossRef
22.
go back to reference (2016) Common vulnerability scoring system 3.0, Recommendation ITU-T X.1521, 03 (2016) Common vulnerability scoring system 3.0, Recommendation ITU-T X.1521, 03
23.
go back to reference IEEE-Standards (2016) Cherry Tom, security AND IOT IN IEEE standards IEEE-Standards (2016) Cherry Tom, security AND IOT IN IEEE standards
Metadata
Title
Internet of things system technologies based on quality of experience
Authors
Dongsik Son
Seungpyo Huh
Taejin Lee
Jin Kwak
Publication date
28-03-2019
Publisher
Springer US
Published in
Peer-to-Peer Networking and Applications / Issue 2/2020
Print ISSN: 1936-6442
Electronic ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-019-00727-1

Other articles of this Issue 2/2020

Peer-to-Peer Networking and Applications 2/2020 Go to the issue

Premium Partner