Survey on Unified Threat Management (UTM) Systems for Home Networks

A Siddiqui, BP Rimal, M Reisslein… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
Home networks increasingly support important networked applications with limited
professional network administration support, while sophisticated attacks pose enormous …

Artificial intelligence enabled cyber security defense for smart cities: A novel attack detection framework based on the MDATA model

Y Jia, Z Gu, L Du, Y Long, Y Wang, J Li… - Knowledge-Based …, 2023 - Elsevier
Smart cities have attracted a lot of attention from interdisciplinary research, and plenty of
artificial intelligence based solutions have been proposed. However, cyber security has …

Autoencoder-based feature construction for IoT attacks clustering

J Haseeb, M Mansoori, Y Hirose, H Al-Sahaf… - Future Generation …, 2022 - Elsevier
Variations in commands executed as part of the attack process can be used to determine the
behavioural patterns of IoT attacks. Existing approaches rely on the domain knowledge of …

[HTML][HTML] PETIoT: PEnetration testing the internet of things

G Bella, P Biondi, S Bognanni, S Esposito - Internet of Things, 2023 - Elsevier
Attackers may attempt exploiting Internet of Things (IoT) devices to operate them unduly as
well as to gather personal data of the legitimate device owners'. Vulnerability Assessment …

CMD: co-analyzed iot malware detection and forensics via network and hardware domains

Z Zhao, Z Li, J Yu, F Zhang, X Xie… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
With the widespread use of Internet of Things (IoT) devices, malware detection has become
a hot spot for both academic and industrial communities. Existing approaches can be …

Exploitation Techniques of IoST Vulnerabilities in Air-Gapped Networks and Security Measures—A Systematic Review

R Hamada, I Kuzminykh - Signals, 2023 - mdpi.com
IP cameras and digital video recorders, as part of the Internet of Surveillance Things (IoST)
technology, can sometimes allow unauthenticated access to the video feed or management …

IoTa: Fine-Grained Traffic Monitoring for IoT Devices via Fully Packet-Level Models

C Duan, S Li, H Lin, W Chen, G Song… - … on Dependable and …, 2023 - ieeexplore.ieee.org
With Internet-of-Things (IoT) devices gaining popularity, dedicated monitoring systems which
accurately detect intrusion traffic for them are in high demand. Existing methods mainly use …

GothX: a generator of customizable, legitimate and malicious IoT network traffic

M Poisson, R Carnier, K Fukuda - Proceedings of the 17th Cyber …, 2024 - dl.acm.org
In recent years, machine learning-based anomaly detection (AD) has become an important
measure against security threats from Internet of Things (IoT) networks. Machine learning …

Probabilistic modelling of deception-based security framework using markov decision process

J Haseeb, SUR Malik, M Mansoori, I Welch - Computers & Security, 2022 - Elsevier
Existing studies using deception are ad-hoc attempts and few theoretical models have been
designed to plan and integrate deception. We theorise that a pre-planning stage should be a …

Failure modes and effects analysis (FMEA) of honeypot-based cybersecurity experiment for IoT

J Haseeb, M Mansoori, I Welch - 2021 IEEE 46th Conference …, 2021 - ieeexplore.ieee.org
Failure Modes and Effects Analysis (FMEA) is the process of identifying potential failure
modes, their causes and effects associated with a product, process or system. In this paper …