A Cost Based Dynamic Response Method for Internet of Things Cyberattacks

Pushpinder Chouhan, Bronagh Quigley, Alfie Beard, Luke Chen

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Internet of Things (IoT) applications have attracted growing attention due to the widespread availability of low-cost, high power computing devices supported by the latest mobile, wireless and edge technologies. Consequently, this has given rise to new opportunities for cyberattacks, both in sophistication and scale. Prior research has predominantly focused on detecting cyberattacks in real time, while attack mitigation is left to security experts, which is usually both time consuming and requires complex decision-making skills like prioritization and the trade-off of impacts and costs. Recently, research has been directed towards deploying automated responses, with these systems mostly employing static rule-based response selection methodologies. In this paper, we present a novel cost-based response selection method for detected attacks, which is both adaptive and dynamic, addressing the importance of attack and host characteristics within response selection. The methodology is tested and evaluated in a use case, in a real-world IoT scenario, demonstrating its effectiveness.
Original languageEnglish
Title of host publication2021 9th International Symposium on Digital Forensics and Security (ISDFS)
Subtitle of host publicationProceedings
ISBN (Electronic)978-1-6654-4481-1
DOIs
Publication statusE-pub ahead of print - 20 Jul 2021
EventInternational Symposium on Digital Forensics and Security - Elazig, Turkey and Online, Elazig, Turkey
Duration: 28 Jun 202129 Jun 2021
http://isdfs.org/

Conference

ConferenceInternational Symposium on Digital Forensics and Security
CountryTurkey
CityElazig
Period28/06/2129/06/21
Internet address

Keywords

  • Cybersecurity
  • Cyberattacks
  • Internet of Things
  • Response selection
  • Knowledge-driven decision making
  • Cost-based analysis

Fingerprint

Dive into the research topics of 'A Cost Based Dynamic Response Method for Internet of Things Cyberattacks'. Together they form a unique fingerprint.

Cite this