Research Article

Investigating Brute Force Attack Patterns in IoT Network

Figure 2

(a) Brute force attacks. (b) Attack pattern based on the correlation approach.
(a)
(b)