Atdhe Buja, Melinda Pacolli, Donika Bajrami and Philip Polstra
Adv. Artif. Intell. Mach. Learn., 4 (2):2233-2243
Atdhe Buja : ICT Academy Research.
Melinda Pacolli : ECPD
Donika Bajrami : ICT Academy Research
Philip Polstra : Bloomsburg University of Pennsylvania
DOI: https://dx.doi.org/10.54364/AAIML.2024.42128
Article History: Received on: 02-Apr-24, Accepted on: 02-May-24, Published on: 27-May-24
Corresponding Author: Atdhe Buja
Email: atdhe.buja@hotmail.com
Citation: Atdhe Buja, Melinda Pacolli, Donika Bajrami, Philip Polstra, Akihiko Mutoh (2024). Time-Series Analysis on AIDE IoT Attack Data Unraveling Trends and Patterns for Enhanced Security. Adv. Artif. Intell. Mach. Learn., 4 (2 ):2233-2243
With the growing use of IoT devices, cyberattacks have increased against these devices, using various exploitable vulnerabilities. Cyberattacks are potentially ruinous events for business owners and the cost of a cyber-attack is not only financial, but companies also must spend time on recovering from the attacks. Through applied research we set out the latest findings and trends to provide new insights into the security of IoTs, focusing on the emerging nature of IoT attacks, frequency, and usual vulnerabilities, thus providing significance to cybersecurity and IoT defense, which will be beneficial to researchers, manufacturers, individuals, organizations, and governments. Although the literature on IoTs is quite rich to this day, however, there is currently no study that provides an in-depth analysis of patterns and frequencies of IoT attacks to discover insights into the most vulnerable times and systems. Compared to other related research on the security of IoTs, this applied research encompasses much more technical angles to the security of IoT. It begins with the comprehensive data acquisition from the Global Cyber Alliance's (GCA) Automated IoT Defense Ecosystem (AIDE) and preprocessing to ensure data integrity and relevance. Followed by a thorough feature selection and engineering process. Python scripts and libraries were used for efficient data analysis. Unraveling Trends and Patterns for Enhanced Security are sensitive areas that have remained untouched by previous research works. Time-Series Analysis on AIDE IoT Attack Data used in this study provided critical insights into attack patterns by fields such as timestamps, attack duration, and login credentials, implying a huge scientific and technological uncover of an intricate and evolving landscape of IoT security threats and attacks.