Research Article

Investigating Brute Force Attack Patterns in IoT Network

Figure 13

Confirmation of alert on attack by the detection algorithm (A) and by Snort (B).