Affiliation:
1. Moscow Technical University of Communications and Informatics
Abstract
The paper considers a method for estimating the fractal properties of traffic, and also evaluates the statistical parameters of the fractal dimension of IoT traffic. An analysis of real traffic with attacks from the Kitsune dump and an analysis of the fractal properties of traffic in normal mode and under the influence of attacks such as SSDP Flood, Mirai, OS Scan showed that jumps in the fractal dimension of traffic when attacks occur can be used to create algorithms for detecting computer attacks in IoT networks. Studies have shown that in the case of online analysis of network traffic, when assessing the RF, preference should be given to the modified algorithm for estimating the Hurst exponent in a sliding analysis window.
Publisher
Bonch-Bruevich State University of Telecommunications
Reference15 articles.
1. Minerva R., Biru A., Rotondi D. Towards a definition of the Internet of Things (IoT). Telecom Italia S.p.A.; 2015. p.10–21. URL: https://iot.ieee.org/images/files/pdf/IEEE_IoT_Towards_Definition_Internet_of_Things_Revision1_27MAY15.pdf [Access-ed 25.10.2023]
2. Dorsemaine B., Gaulier J.-P., Wary J.-P., Kheir N., Urien P. Internet of Things: A Definition & Taxonomy. Proceedings of the 9th International Conference on Next Generation Mobile Applications, Services and Technologies (NGMAST, Cambridge, UK, 09‒11 September 2015). IEEE; 2015. DOI:10.1109/NGMAST.2015.71
3. Statista. Internet of Things (IoT) connected devices installed base worldwide from 2015 to 2025. URL: https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide [Accessed 12.02.2023]
4. Securelist. Demeter D., Preuss M., Shmelev Y. IoT: a malware story. 2019. URL: https://securelist.com/iot-a-malware-story/94451 [Accessed 11.02.2023]
5. Shevtsov V.Y., Kasimovsky N.P Threat and vulnerability analysis of IoT and IIoT concepts. NBI technologies. 2020;14(3): 28‒35. DOI:10.15688/NBIT.jvolsu.2020.3.5
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献