ISSN :2582-9793

Time-Series Analysis on AIDE IoT Attack Data Unraveling Trends and Patterns for Enhanced Security

Original Research (Published On: 27-May-2024 )
Time-Series Analysis on AIDE IoT Attack Data Unraveling Trends and Patterns for Enhanced Security
DOI : https://dx.doi.org/10.54364/AAIML.2024.42128

Atdhe Buja, Melinda Pacolli, Donika Bajrami and Philip Polstra

Adv. Artif. Intell. Mach. Learn., 4 (2):2233-2243

Atdhe Buja : ICT Academy Research.

Melinda Pacolli : ECPD

Donika Bajrami : ICT Academy Research

Philip Polstra : Bloomsburg University of Pennsylvania

Download PDF Here

DOI: https://dx.doi.org/10.54364/AAIML.2024.42128

Article History: Received on: 02-Apr-24, Accepted on: 02-May-24, Published on: 27-May-24

Corresponding Author: Atdhe Buja

Email: atdhe.buja@hotmail.com

Citation: Atdhe Buja, Melinda Pacolli, Donika Bajrami, Philip Polstra, Akihiko Mutoh (2024). Time-Series Analysis on AIDE IoT Attack Data Unraveling Trends and Patterns for Enhanced Security. Adv. Artif. Intell. Mach. Learn., 4 (2 ):2233-2243

          

Abstract

    

With the growing use of IoT devices, cyberattacks have increased against these devices, using various exploitable vulnerabilities. Cyberattacks are potentially ruinous events for business owners and the cost of a cyber-attack is not only financial, but companies also must spend time on recovering from the attacks.  Through applied research we set out the latest findings and trends to provide new insights into the security of IoTs, focusing on the emerging nature of IoT attacks, frequency, and usual vulnerabilities, thus providing significance to cybersecurity and IoT defense, which will be beneficial to researchers, manufacturers, individuals, organizations, and governments. Although the literature on IoTs is quite rich to this day, however, there is currently no study that provides an in-depth analysis of patterns and frequencies of IoT attacks to discover insights into the most vulnerable times and systems. Compared to other related research on the security of IoTs, this applied research encompasses much more technical angles to the security of IoT. It begins with the comprehensive data acquisition from the Global Cyber Alliance's (GCA) Automated IoT Defense Ecosystem (AIDE) and preprocessing to ensure data integrity and relevance. Followed by a thorough feature selection and engineering process. Python scripts and libraries were used for efficient data analysis. Unraveling Trends and Patterns for Enhanced Security are sensitive areas that have remained untouched by previous research works. Time-Series Analysis on AIDE IoT Attack Data used in this study provided critical insights into attack patterns by fields such as timestamps, attack duration, and login credentials, implying a huge scientific and technological uncover of an intricate and evolving landscape of IoT security threats and attacks

Statistics

   Article View: 447
   PDF Downloaded: 18