A comprehensive survey of recent internet measurement techniques for cyber security

MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …

How machine learning changes the nature of cyberattacks on IoT networks: A survey

E Bout, V Loscri, A Gallais - IEEE Communications Surveys & …, 2021 - ieeexplore.ieee.org
The Internet of Things (IoT) has continued gaining in popularity and importance in everyday
life in recent years. However, this development does not only present advantages. Indeed …

Information exposure from consumer iot devices: A multidimensional, network-informed measurement approach

J Ren, DJ Dubois, D Choffnes, AM Mandalari… - Proceedings of the …, 2019 - dl.acm.org
Internet of Things (IoT) devices are increasingly found in everyday homes, providing useful
functionality for devices such as TVs, smart speakers, and video doorbells. Along with their …

Machine learning-powered encrypted network traffic analysis: a comprehensive survey

M Shen, K Ye, X Liu, L Zhu, J Kang… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
Traffic analysis is the process of monitoring network activities, discovering specific patterns,
and gleaning valuable information from network traffic. It can be applied in various fields …

A survey on device behavior fingerprinting: Data sources, techniques, application scenarios, and datasets

PMS Sánchez, JMJ Valero, AH Celdrán… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
In the current network-based computing world, where the number of interconnected devices
grows exponentially, their diversity, malfunctions, and cybersecurity threats are increasing at …

Fingerprinting encrypted voice traffic on smart speakers with deep learning

C Wang, S Kennedy, H Li, K Hudson, G Atluri… - Proceedings of the 13th …, 2020 - dl.acm.org
This paper investigates the privacy leakage of smart speakers under an encrypted traffic
analysis attack, referred to as voice command fingerprinting. In this attack, an adversary can …

A real-time IoT-based botnet detection method using a novel two-step feature selection technique and the support vector machine classifier

Y Masoudi-Sobhanzadeh, S Emami-Moghaddam - Computer Networks, 2022 - Elsevier
A botnet, which is a collection of devices polluted by malicious software programs, is among
the top security challenges in the Internet of Things (IoT) environments. Therefore, to deal …

A survey of smart home iot device classification using machine learning-based network traffic analysis

H Jmila, G Blanc, MR Shahid, M Lazrag - IEEE Access, 2022 - ieeexplore.ieee.org
Smart home IoT devices lack proper security, raising safety and privacy concerns. One-size-
fits-all network administration is ineffective because of the diverse QoS requirements of IoT …

Locality-sensitive iot network traffic fingerprinting for device identification

B Charyyev, MH Gunes - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
Engineered systems get smarter with computing capabilities, particularly through a multitude
of Internet-of-Things (IoT) devices. IoT devices, however, are prone to be compromised as …

On the use of artificial intelligence to deal with privacy in IoT systems: A systematic literature review

G Giordano, F Palomba, F Ferrucci - Journal of Systems and Software, 2022 - Elsevier
Abstract The Internet of Things (IoT) refers to a network of Internet-enabled devices that can
make different operations, like sensing, communicating, and reacting to changes arising in …