Automating Internet of Things network traffic collection with robotic arm interactions

X Jiang, N Apthorpe - arXiv preprint arXiv:2110.00060, 2021 - arxiv.org
Consumer Internet of things research often involves collecting network traffic sent or
received by IoT devices. These data are typically collected via crowdsourcing or while …

Cluster analysis of malware family relationships

S Basole, M Stamp - Malware Analysis Using Artificial Intelligence and …, 2021 - Springer
In this chapter, we use K-means clustering to analyze various relationships between
malware samples. We consider a dataset comprising 20 malware families with 1000 …

Cyber‐Securing IoT Infrastructure by Modeling Network Traffic

H Habibi Gharakheili, A Hamza… - Security and Privacy in …, 2021 - Wiley Online Library
In recent years, there has been growing recognition that machine learning is not a “silver
bullet” that can magically detect all cyber‐security threats, but is instead more effective in a …

The dark (and bright) side of IoT: Attacks and countermeasures for identifying smart home devices and services

AM Hussain, G Oligeri, T Voigt - … , Nanjing, China, December 18-20, 2020 …, 2021 - Springer
We present a new machine learning-based attack that exploits network patterns to detect the
presence of smart IoT devices and running services in the WiFi radio spectrum. We perform …

Evaluating the security of machine learning based IoT device identification systems against adversarial examples

A Namvar, C Thapa, SS Kanhere… - … -Oriented Computing: 19th …, 2021 - Springer
Abstract Machine learning (ML) has been extensively used in Internet of Things (IoT)
applications, including traffic profiling, network security, and IoT device identification …

Integrity of IoT network flow records in encrypted traffic analytics

AK Cherukuri, IS Thaseen, G Li, X Liu… - Security and Privacy …, 2021 - Wiley Online Library
Identifying threats in encrypted network traffic without compromising the integrity of the data
is an important issue. Many IoT devices communicate with the cloud to store and process …

Smart home: Keeping privacy based on Air‐Padding

Q Zhu, C Yang, Y Zheng, J Ma, H Li… - IET Information …, 2021 - Wiley Online Library
With the rapid development of the IoT, smart home plays an increasingly important role in
daily life. At the same time, privacy issues have gradually aroused the concern of …

Deep learning for Internet of Things (IoT) network security

MR Shahid - 2021 - theses.hal.science
The growing Internet of Things (IoT) introduces new security challenges for network activity
monitoring. Most IoT devices are vulnerable because of a lack of security awareness from …

Multi-level IoT device identification

R Jiao, Z Liu, L Liu, C Ge… - 2021 IEEE 27th …, 2021 - ieeexplore.ieee.org
The rapid development of the Internet of Things (IoT) has brought challenges to IoT
platforms for high-efficiency deployments and low-budget management. Identifying IoT …

You Are (not) Who Your Peers Are: Identification of Potentially Excessive Permission Requests in Android Apps

P Mallojula, J Ahmad, F Li, B Luo - 2021 IEEE 20th …, 2021 - ieeexplore.ieee.org
Millions of Android applications are now deployed on billions of smartphones and tablet
devices. An enormous amount of users' private data are being collected and made …