A Cost Based Dynamic Response Method for Internet of Things Cyberattacks

Pushpinder Chouhan, Bronagh Quigley, Alfie Beard, Luke Chen

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review


Internet of Things (IoT) applications have attracted growing attention due to the widespread availability of low-cost, high power computing devices supported by the latest mobile, wireless and edge technologies. Consequently, this has given rise to new opportunities for cyberattacks, both in sophistication and scale. Prior research has predominantly focused on detecting cyberattacks in real time, while attack mitigation is left to security experts, which is usually both time consuming and requires complex decision-making skills like prioritization and the trade-off of impacts and costs. Recently, research has been directed towards deploying automated responses, with these systems mostly employing static rule-based response selection methodologies. In this paper, we present a novel cost-based response selection method for detected attacks, which is both adaptive and dynamic, addressing the importance of attack and host characteristics within response selection. The methodology is tested and evaluated in a use case, in a real-world IoT scenario, demonstrating its effectiveness.
Original languageEnglish
Title of host publication2021 9th International Symposium on Digital Forensics and Security (ISDFS)
Subtitle of host publicationProceedings
EditorsAsaf Varol, Murat Karabatak, Cihan Varol
ISBN (Electronic)978-1-6654-4481-1
Publication statusPublished online - 20 Jul 2021
EventInternational Symposium on Digital Forensics and Security - Elazig, Turkey and Online, Elazig, Turkey
Duration: 28 Jun 202129 Jun 2021

Publication series

Name9th International Symposium on Digital Forensics and Security, ISDFS 2021


ConferenceInternational Symposium on Digital Forensics and Security
Internet address

Bibliographical note

Publisher Copyright:
© 2021 IEEE.


  • Cost-based analysis
  • Cyberattacks
  • Cybersecurity
  • Internet of Things
  • Knowledge-driven decision making
  • Response selection


Dive into the research topics of 'A Cost Based Dynamic Response Method for Internet of Things Cyberattacks'. Together they form a unique fingerprint.

Cite this