A machine learning based framework for IoT device identification and abnormal traffic detection

O Salman, IH Elhajj, A Chehab… - Transactions on …, 2022 - Wiley Online Library
Network security is a key challenge for the deployment of Internet of Things (IoT). New
attacks have been developed to exploit the vulnerabilities of IoT devices. Moreover, IoT …

Energy consumption of on-device machine learning models for IoT intrusion detection

N Tekin, A Acar, A Aris, AS Uluagac, VC Gungor - Internet of Things, 2023 - Elsevier
Abstract Recently, Smart Home Systems (SHSs) have gained enormous popularity with the
rapid development of the Internet of Things (IoT) technologies. Besides offering many …

Self-configurable cyber-physical intrusion detection for smart homes using reinforcement learning

R Heartfield, G Loukas, A Bezemskij… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The modern Internet of Things (IoT)-based smart home is a challenging environment to
secure: devices change, new vulnerabilities are discovered and often remain unpatched …

Program analysis of commodity IoT applications for security and privacy: Challenges and opportunities

ZB Celik, E Fernandes, E Pauley, G Tan… - ACM Computing …, 2019 - dl.acm.org
Recent advances in Internet of Things (IoT) have enabled myriad domains such as smart
homes, personal monitoring devices, and enhanced manufacturing. IoT is now pervasive …

HomeSnitch: Behavior transparency and control for smart home IoT devices

TJ OConnor, R Mohamed, M Miettinen… - Proceedings of the 12th …, 2019 - dl.acm.org
The widespread adoption of smart home IoT devices has led to a broad and heterogeneous
market with flawed security designs and privacy concerns. While the quality of IoT device …

Recent advances in artificial intelligence for wireless internet of things and cyber–physical systems: A comprehensive survey

BA Salau, A Rawal, DB Rawat - IEEE Internet of Things Journal, 2022 - ieeexplore.ieee.org
Advances in artificial intelligence (AI) and wireless technology are driving forward the large
deployment of interconnected smart technologies that constitute cyber–physical systems …

A review on machine learning–based approaches for Internet traffic classification

O Salman, IH Elhajj, A Kayssi, A Chehab - Annals of Telecommunications, 2020 - Springer
Traffic classification acquired the interest of the Internet community early on. Different
approaches have been proposed to classify Internet traffic to manage both security and …

Survey on enterprise Internet-of-Things systems (E-IoT): A security perspective

LP Rondon, L Babun, A Aris, K Akkaya, AS Uluagac - Ad Hoc Networks, 2022 - Elsevier
As technology becomes more widely available, millions of users worldwide have installed
some form of smart device in their homes or workplaces. These devices are often off-the …

物联网安全研究综述: 威胁, 检测与防御

杨毅宇, 周威, 赵尚儒, 刘聪, 张宇辉, 王鹤… - 通信 …, 2021 - infocomm-journal.com
基于近5 年网安国际会议(ACM CCS, USENIX Security, NDSS, IEEE S&P)
中发表的物联网安全文献, 以及其他部分高水平研究工作, 从威胁, 检测, 防御的视角对物联网 …

Detecting unknown encrypted malicious traffic in real time via flow interaction graph analysis

C Fu, Q Li, K Xu - arXiv preprint arXiv:2301.13686, 2023 - arxiv.org
In this paper, we propose HyperVision, a realtime unsupervised machine learning (ML)
based malicious traffic detection system. Particularly, HyperVision is able to detect unknown …