Detect-IoT: A Comparative Analysis of Machine Learning Algorithms for Detecting Compromised IoT Devices

YR Siwakoti, DB Rawat - Proceedings of the Twenty-fourth International …, 2023 - dl.acm.org
The rapid expansion of IoT brings unmatched convenience and connectivity, but it also
raises significant security concerns. The prioritization of functionality over security in IoT …

[图书][B] Improving IoT Security Based on Network Traffic Analytics

M Mainuddin - 2023 - search.proquest.com
Abstract The Internet of Things (IoT) has revolutionized how we interact with technology by
enabling numerous devices to communicate and autonomously perform tasks in various …

IoT behavioral monitoring via network traffic analysis

A Sivanathan - arXiv preprint arXiv:2001.10632, 2020 - arxiv.org
Smart homes, enterprises, and cities are increasingly being equipped with a plethora of
Internet of Things (IoT), ranging from smart-lights to security cameras. While IoT networks …

Detecting Anomalies in IoT Devices: A Machine Learning-Based Solution

R Al Attar, M Alohaly - 2024 - preprints.org
The growing shift toward Internet of Things (IoT)-based solutions expands the attack surface
of systems by connecting an extensive network of heterogeneous devices and technologies …

IoT-KEEPER: Detecting malicious IoT network activity using online traffic analysis at the edge

I Hafeez, M Antikainen, AY Ding… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
IoT devices are notoriously vulnerable even to trivial attacks and can be easily
compromised. In addition, resource constraints and heterogeneity of IoT devices make it …

Classifying IoT devices in smart environments using network traffic characteristics

A Sivanathan, HH Gharakheili, F Loi… - IEEE Transactions …, 2018 - ieeexplore.ieee.org
The Internet of Things (IoT) is being hailed as the next wave revolutionizing our society, and
smart homes, enterprises, and cities are increasingly being equipped with a plethora of IoT …

Explainable Intrusion Detection System in IoT Scenarios: A Cross-Device Model Training and Evaluation for Traffic Classification

P Ducange, M Fazzolari, F Marcelloni - 2024 - scholarspace.manoa.hawaii.edu
The proliferation of IoT devices in our daily lives has raised concerns about the security of
transmitted data. Due to their limited resources, IoT devices are vulnerable to malware …

Toward the protection of IoT networks: Introducing the LATAM-DDoS-IoT dataset

JG Almaraz-Rivera, JA Perez-Diaz… - IEEE …, 2022 - ieeexplore.ieee.org
Anomaly detection is a well-known topic in cybersecurity. Its application to the Internet of
Things can lead to suitable protection techniques against problems such as denial of service …

Detection of unauthorized IoT devices using machine learning techniques

Y Meidan, M Bohadana, A Shabtai, M Ochoa… - arXiv preprint arXiv …, 2017 - arxiv.org
Security experts have demonstrated numerous risks imposed by Internet of Things (IoT)
devices on organizations. Due to the widespread adoption of such devices, their diversity …

MUDIS: MUD Inspection System

R Shister - 2022 - search.proquest.com
Analyzing the network behavior of IoT devices, including which domains, protocols, and
ports the device communicates with, is a fundamental challenge for IoT security and …