Research Article
Investigating Brute Force Attack Patterns in IoT Network
| Method | Findings |
| Snort | Successfully detected. | Attack identification procedure (Figure 7) | Successfully detected. Consistent to Snort results | Statistical relationship approach | Successfully provides attack traffic patterns | Visualization | Provides clear traffic pattern of the brute force attacks |
|
|