BOTA: Explainable IoT malware detection in large networks

D Uhříček, K Hynek, T Čejka… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
Explainability and alert reasoning are essential but often neglected properties of intrusion
detection systems. The lack of explainability reduces security personnel's trust, limiting the …

A Generic And Real-Time Internet Of Things Attack Realization And Detection Testbed

MR Kuşkon - 2023 - research.sabanciuniv.edu
The rapidly evolving Internet of Things (IoT) systems, which transform ordinary objects into
interconnected smart devices, offer numerous advantages such as improved data collection …

[PDF][PDF] Siotome: An edge-isp collaborative architecture for iot security

H Haddadi, V Christophides, R Teixeira, K Cho… - Proc …, 2018 - haddadi.github.io
Modern households are deploying Internet of Things (IoT) devices at a fast pace. The
heterogeneity of these devices, which range from low-end sensors to smart TVs, make …

Edge-based intrusion detection for IoT devices

A Mudgerikar, P Sharma, E Bertino - ACM Transactions on Management …, 2020 - dl.acm.org
As the Internet of Things (IoT) is estimated to grow to 25 billion by 2021, there is a need for
an effective and efficient Intrusion Detection System (IDS) for IoT devices. Traditional …

[PDF][PDF] Poisoning attacks on federated learning-based IoT intrusion detection system

TD Nguyen, P Rieger, M Miettinen… - … Decentralized IoT Syst …, 2020 - ndss-symposium.org
Federated Learning (FL) is an appealing method for applying machine learning to large
scale systems due to the privacy and efficiency advantages that its training mechanism …

Detect-IoT: A Comparative Analysis of Machine Learning Algorithms for Detecting Compromised IoT Devices

YR Siwakoti, DB Rawat - Proceedings of the Twenty-fourth International …, 2023 - dl.acm.org
The rapid expansion of IoT brings unmatched convenience and connectivity, but it also
raises significant security concerns. The prioritization of functionality over security in IoT …

IDAC: Federated Learning-Based Intrusion Detection Using Autonomously Extracted Anomalies in IoT

T Ohtani, R Yamamoto, S Ohzahata - Sensors, 2024 - mdpi.com
The recent rapid growth in Internet of Things (IoT) technologies is enriching our daily lives
but significant information security risks in IoT fields have become apparent. In fact, there …

Toward improving the security of IoT and CPS devices: An AI approach

A Albasir, K Naik, R Manzano - Digital Threats: Research and Practice, 2023 - dl.acm.org
Detecting anomalously behaving devices in security-and-safety-critical applications is an
important challenge. This article presents an off-device methodology for detecting the …

ELF analyzer demo: Online identification for IoT malwares with multiple hardware architectures

SM Cheng, T Ban, JW Huang… - 2020 IEEE Security …, 2020 - ieeexplore.ieee.org
This demonstration presents an automatic IoT runtime platform with a web interface, ELF
Analyzer, where suspicious ELF files uploaded by users could be executed and dynamically …

{ARGUS}:{Context-Based} Detection of Stealthy {IoT} Infiltration Attacks

P Rieger, M Chilese, R Mohamed, M Miettinen… - 32nd USENIX Security …, 2023 - usenix.org
IoT application domains, device diversity and connectivity are rapidly growing. IoT devices
control various functions in smart homes and buildings, smart cities, and smart factories …