Skip to main content
Log in

Internet of things system technologies based on quality of experience

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

With rapid development of IOT technology, QOE is considered in design process to ensure that end users are satisfied using IOT applications and System. However, as if to mock this new paradigm, hackers in the cyber world are attacking the subjective acceptability of an IOT application perceived by the end user through intelligent cyber threats such as DDoS attacks, wiretapping, remote control, ID/Password hijacking using IOT devices. Due to this, the number of SIEM introduction is increasing in order to detect threat patterns in a short period of time with a large amount of structured/unstructured data from IOT devices, to precisely diagnose crisis to threats, and to provide an accurate alarm to an administrator by correlating collected information. In this paper, we design and propose an automated profiling model that leverages the analysis results of the IOT event profiling in SIEM to improve attack detection, efficiency and speed against potential threats.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

  1. http://www.kr.idc.asia/press/pressreleasearticle.aspx?prid=483

  2. Butler B (2014) Gartner: Internet of Things has reached hype peak, 13:8. http://www.networkworld.com/article/2464007/cloudcomputing/gartner-internet-of-things-has-reached-hype-peak.html

  3. Andrey F, Igor K, Didier E (2017) Correlation of security events based on the analysis of structures of event types. Intelligent Data Acquisition and Advanced Computing Systems, IEEE

  4. Gartner Magic Quadrant (2016) Magic Quadrant for Security Information and Event Management, 3

  5. Reza S, Ali G (2006) Alert correlation survey: framework and techniques. In: Proceedings of the 2006 international conference on privacy, security and trust. Article no. 37

  6. Jeon I-s, Han K-h, Kim D-w, Choi J-y (2015) Using the SIEM Software vulnerability detection model proposed. J Korea Inst Inf Secur Cryptology, pp 962–965

  7. Idoia A, Sergio A (2012) Improving the automation of security information management: a collaborative approach. IEEE Secur Privacy 10(1):55–59

    Article  Google Scholar 

  8. Alistair S (1998) Scenario-based requirements analysis. Requirements Eng 3(1):48–65

    Article  Google Scholar 

  9. Manuel E, Theodoor S, Engin K, Christopher K (2012) A survey on automated dynamic malware-analysis techniques and tools. J ACM Comput Survey, pp 8-9

  10. Alvaro A, Pratyusa K, Sreeranga P (2013) Big data analytics for security. IEEE Secur Privacy, pp 11-12

  11. Matthias G, Michael F, Basel K, Adrian T, Ruth B, Alessandro M Anomaly Detection in the Cloud: Detecting Security Incidents via Machine Learning. International Workshop on Eternal Systems: EternalS 2012: Trustworthy Eternal Systems via Evolving Software Data and Knowledge. 103-116

  12. Chen K-Y, Luesak L, Chou S-T (2007) Hot topic extraction based on timeline analysis and multidimensional sentence modeling. IEEE Trans Knowl Data Eng, pp 1023-1024

  13. Canfora G, Ceccarelli M, Cerulo L, Di Penta M (2010) Using multivariate time series and association rules to detect logical change coupling: An empirical study. In: IEEE international conference on software maintenance (ICSM), vol 2010

  14. Yunhong Z, Robert W, Pan S (2008) Large-scale parallel collaborative filtering for the netflix prize. In: International conference on algorithmic applications in management, pp 337–348

  15. Sarwar B, Karypis G, Konstan J, Riedl J (2001) Item-based collaborative filtering recommendation algorithms. In: Proceeding WWW ’01 Proceedings of the 10th international conference on World Wide Web. ACM, New York, pp 285–295

  16. Linden G, Smith B, York J (2003) https://www.Amazon.com recommenda-tions: item-to-item collaborative filtering. IEEE Internet Comput, pp 78-79

  17. Lops P, de Gemmis M, Semeraro G (2010) Content-based recommender systems: state of the art and trends, recommender systems handbook, pp 73–105

    Google Scholar 

  18. Fang S, Xu LD, Zhu Y, Ahati J, Pei H, Yan J, Liu Z (2014) An integrated system for regional environmental monitoring and management based on internet of things. IEEE Trans Ind Inf 10(2):1596

    Article  Google Scholar 

  19. Cisco (2013) The Internet of Everything for Cities: Connecting People, Process, Data, and Things To Improve the ‘Livability’ of Cities and Communities, Cisco Point of View Report. http://docbox.etsi.org/Workshop/2013/201306_SMARTCITIES/S03_SmartintheCity/CISCO_andriantsiferana.pdf

  20. Zhu J, Chan DS, Prabhu MS, Natarajan P, Hu H, Bonomi F (2013) Improving Web Sites Performance Using Edge Servers in Fog Computing Architecture. In Service Oriented System Engineering (SOSE)

  21. Gubbi J, Buyya R, Marusic S, Palaniswami M (2013) Ioe (IoE): a vision architectural elements and future directions. Futur Gener Comput Syst 29(7):1645–1660

    Article  Google Scholar 

  22. (2016) Common vulnerability scoring system 3.0, Recommendation ITU-T X.1521, 03

  23. IEEE-Standards (2016) Cherry Tom, security AND IOT IN IEEE standards

Download references

Acknowledgements

This work was supported by the National Research Foundation of Korea(NRF) grant funded by the Korea government(MSIT) (No. NRF-2017R1E1A1A01075110)

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jin Kwak.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article is part of the Topical Collection: Special Issue on IoT System Technologies based on Quality of Experience

Guest Editors: Cho Jaeik, Naveen Chilamkurti, and SJ Wang

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Son, D., Huh, S., Lee, T. et al. Internet of things system technologies based on quality of experience. Peer-to-Peer Netw. Appl. 13, 475–488 (2020). https://doi.org/10.1007/s12083-019-00727-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-019-00727-1

Keywords

Navigation