Research Article

Investigating Brute Force Attack Patterns in IoT Network

Table 2

Summary of the findings.

MethodFindings

SnortSuccessfully detected.
Attack identification procedure (Figure 7)Successfully detected. Consistent to Snort results
Statistical relationship approachSuccessfully provides attack traffic patterns
VisualizationProvides clear traffic pattern of the brute force attacks