Skip to main content
Erschienen in: Peer-to-Peer Networking and Applications 2/2020

28.03.2019

Internet of things system technologies based on quality of experience

verfasst von: Dongsik Son, Seungpyo Huh, Taejin Lee, Jin Kwak

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 2/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With rapid development of IOT technology, QOE is considered in design process to ensure that end users are satisfied using IOT applications and System. However, as if to mock this new paradigm, hackers in the cyber world are attacking the subjective acceptability of an IOT application perceived by the end user through intelligent cyber threats such as DDoS attacks, wiretapping, remote control, ID/Password hijacking using IOT devices. Due to this, the number of SIEM introduction is increasing in order to detect threat patterns in a short period of time with a large amount of structured/unstructured data from IOT devices, to precisely diagnose crisis to threats, and to provide an accurate alarm to an administrator by correlating collected information. In this paper, we design and propose an automated profiling model that leverages the analysis results of the IOT event profiling in SIEM to improve attack detection, efficiency and speed against potential threats.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
3.
Zurück zum Zitat Andrey F, Igor K, Didier E (2017) Correlation of security events based on the analysis of structures of event types. Intelligent Data Acquisition and Advanced Computing Systems, IEEE Andrey F, Igor K, Didier E (2017) Correlation of security events based on the analysis of structures of event types. Intelligent Data Acquisition and Advanced Computing Systems, IEEE
4.
Zurück zum Zitat Gartner Magic Quadrant (2016) Magic Quadrant for Security Information and Event Management, 3 Gartner Magic Quadrant (2016) Magic Quadrant for Security Information and Event Management, 3
5.
Zurück zum Zitat Reza S, Ali G (2006) Alert correlation survey: framework and techniques. In: Proceedings of the 2006 international conference on privacy, security and trust. Article no. 37 Reza S, Ali G (2006) Alert correlation survey: framework and techniques. In: Proceedings of the 2006 international conference on privacy, security and trust. Article no. 37
6.
Zurück zum Zitat Jeon I-s, Han K-h, Kim D-w, Choi J-y (2015) Using the SIEM Software vulnerability detection model proposed. J Korea Inst Inf Secur Cryptology, pp 962–965 Jeon I-s, Han K-h, Kim D-w, Choi J-y (2015) Using the SIEM Software vulnerability detection model proposed. J Korea Inst Inf Secur Cryptology, pp 962–965
7.
Zurück zum Zitat Idoia A, Sergio A (2012) Improving the automation of security information management: a collaborative approach. IEEE Secur Privacy 10(1):55–59CrossRef Idoia A, Sergio A (2012) Improving the automation of security information management: a collaborative approach. IEEE Secur Privacy 10(1):55–59CrossRef
8.
Zurück zum Zitat Alistair S (1998) Scenario-based requirements analysis. Requirements Eng 3(1):48–65CrossRef Alistair S (1998) Scenario-based requirements analysis. Requirements Eng 3(1):48–65CrossRef
9.
Zurück zum Zitat Manuel E, Theodoor S, Engin K, Christopher K (2012) A survey on automated dynamic malware-analysis techniques and tools. J ACM Comput Survey, pp 8-9 Manuel E, Theodoor S, Engin K, Christopher K (2012) A survey on automated dynamic malware-analysis techniques and tools. J ACM Comput Survey, pp 8-9
10.
Zurück zum Zitat Alvaro A, Pratyusa K, Sreeranga P (2013) Big data analytics for security. IEEE Secur Privacy, pp 11-12 Alvaro A, Pratyusa K, Sreeranga P (2013) Big data analytics for security. IEEE Secur Privacy, pp 11-12
11.
Zurück zum Zitat Matthias G, Michael F, Basel K, Adrian T, Ruth B, Alessandro M Anomaly Detection in the Cloud: Detecting Security Incidents via Machine Learning. International Workshop on Eternal Systems: EternalS 2012: Trustworthy Eternal Systems via Evolving Software Data and Knowledge. 103-116 Matthias G, Michael F, Basel K, Adrian T, Ruth B, Alessandro M Anomaly Detection in the Cloud: Detecting Security Incidents via Machine Learning. International Workshop on Eternal Systems: EternalS 2012: Trustworthy Eternal Systems via Evolving Software Data and Knowledge. 103-116
12.
Zurück zum Zitat Chen K-Y, Luesak L, Chou S-T (2007) Hot topic extraction based on timeline analysis and multidimensional sentence modeling. IEEE Trans Knowl Data Eng, pp 1023-1024 Chen K-Y, Luesak L, Chou S-T (2007) Hot topic extraction based on timeline analysis and multidimensional sentence modeling. IEEE Trans Knowl Data Eng, pp 1023-1024
13.
Zurück zum Zitat Canfora G, Ceccarelli M, Cerulo L, Di Penta M (2010) Using multivariate time series and association rules to detect logical change coupling: An empirical study. In: IEEE international conference on software maintenance (ICSM), vol 2010 Canfora G, Ceccarelli M, Cerulo L, Di Penta M (2010) Using multivariate time series and association rules to detect logical change coupling: An empirical study. In: IEEE international conference on software maintenance (ICSM), vol 2010
14.
Zurück zum Zitat Yunhong Z, Robert W, Pan S (2008) Large-scale parallel collaborative filtering for the netflix prize. In: International conference on algorithmic applications in management, pp 337–348 Yunhong Z, Robert W, Pan S (2008) Large-scale parallel collaborative filtering for the netflix prize. In: International conference on algorithmic applications in management, pp 337–348
15.
Zurück zum Zitat Sarwar B, Karypis G, Konstan J, Riedl J (2001) Item-based collaborative filtering recommendation algorithms. In: Proceeding WWW ’01 Proceedings of the 10th international conference on World Wide Web. ACM, New York, pp 285–295 Sarwar B, Karypis G, Konstan J, Riedl J (2001) Item-based collaborative filtering recommendation algorithms. In: Proceeding WWW ’01 Proceedings of the 10th international conference on World Wide Web. ACM, New York, pp 285–295
17.
Zurück zum Zitat Lops P, de Gemmis M, Semeraro G (2010) Content-based recommender systems: state of the art and trends, recommender systems handbook, pp 73–105 Lops P, de Gemmis M, Semeraro G (2010) Content-based recommender systems: state of the art and trends, recommender systems handbook, pp 73–105
18.
Zurück zum Zitat Fang S, Xu LD, Zhu Y, Ahati J, Pei H, Yan J, Liu Z (2014) An integrated system for regional environmental monitoring and management based on internet of things. IEEE Trans Ind Inf 10(2):1596CrossRef Fang S, Xu LD, Zhu Y, Ahati J, Pei H, Yan J, Liu Z (2014) An integrated system for regional environmental monitoring and management based on internet of things. IEEE Trans Ind Inf 10(2):1596CrossRef
20.
Zurück zum Zitat Zhu J, Chan DS, Prabhu MS, Natarajan P, Hu H, Bonomi F (2013) Improving Web Sites Performance Using Edge Servers in Fog Computing Architecture. In Service Oriented System Engineering (SOSE) Zhu J, Chan DS, Prabhu MS, Natarajan P, Hu H, Bonomi F (2013) Improving Web Sites Performance Using Edge Servers in Fog Computing Architecture. In Service Oriented System Engineering (SOSE)
21.
Zurück zum Zitat Gubbi J, Buyya R, Marusic S, Palaniswami M (2013) Ioe (IoE): a vision architectural elements and future directions. Futur Gener Comput Syst 29(7):1645–1660CrossRef Gubbi J, Buyya R, Marusic S, Palaniswami M (2013) Ioe (IoE): a vision architectural elements and future directions. Futur Gener Comput Syst 29(7):1645–1660CrossRef
22.
Zurück zum Zitat (2016) Common vulnerability scoring system 3.0, Recommendation ITU-T X.1521, 03 (2016) Common vulnerability scoring system 3.0, Recommendation ITU-T X.1521, 03
23.
Zurück zum Zitat IEEE-Standards (2016) Cherry Tom, security AND IOT IN IEEE standards IEEE-Standards (2016) Cherry Tom, security AND IOT IN IEEE standards
Metadaten
Titel
Internet of things system technologies based on quality of experience
verfasst von
Dongsik Son
Seungpyo Huh
Taejin Lee
Jin Kwak
Publikationsdatum
28.03.2019
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 2/2020
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-019-00727-1

Weitere Artikel der Ausgabe 2/2020

Peer-to-Peer Networking and Applications 2/2020 Zur Ausgabe

Premium Partner