Blocking without breaking: Identification and mitigation of non-essential iot traffic
Despite the prevalence of Internet of Things (IoT) devices, there is little information about the
purpose and risks of the Internet traffic these devices generate, and consumers have limited …
purpose and risks of the Internet traffic these devices generate, and consumers have limited …
An analysis of home IoT network traffic and behaviour
Internet-connected devices are increasingly present in our homes, and privacy breaches,
data thefts, and security threats are becoming commonplace. In order to avoid these, we …
data thefts, and security threats are becoming commonplace. In order to avoid these, we …
A haystack full of needles: Scalable detection of iot devices in the wild
Consumer Internet of Things (IoT) devices are extremely popular, providing users with rich
and diverse functionalities, from voice assistants to home appliances. These functionalities …
and diverse functionalities, from voice assistants to home appliances. These functionalities …
IoT behavioral monitoring via network traffic analysis
A Sivanathan - arXiv preprint arXiv:2001.10632, 2020 - arxiv.org
Smart homes, enterprises, and cities are increasingly being equipped with a plethora of
Internet of Things (IoT), ranging from smart-lights to security cameras. While IoT networks …
Internet of Things (IoT), ranging from smart-lights to security cameras. While IoT networks …
Clear as MUD: Generating, validating and applying IoT behavioral profiles
A Hamza, D Ranathunga, HH Gharakheili… - Proceedings of the …, 2018 - dl.acm.org
IoT devices are increasingly being implicated in cyber-attacks, raising community concern
about the risks they pose to critical infrastructure, corporations, and citizens. In order to …
about the risks they pose to critical infrastructure, corporations, and citizens. In order to …
Revisiting iot device identification
Internet-of-Things (IoT) devices are known to be the source of many security problems, and
as such, they would greatly benefit from automated management. This requires robustly …
as such, they would greatly benefit from automated management. This requires robustly …
Internet-scale insecurity of consumer internet of things: An empirical measurements perspective
A Mangino, MS Pour, E Bou-Harb - ACM Transactions on Management …, 2020 - dl.acm.org
The number of Internet-of-Things (IoT) devices actively communicating across the Internet is
continually increasing, as these devices are deployed across a variety of sectors, constantly …
continually increasing, as these devices are deployed across a variety of sectors, constantly …
Inferring, characterizing, and investigating internet-scale malicious iot device activities: A network telescope perspective
Recent attacks have highlighted the insecurity of the Internet of Things (IoT) paradigm by
demonstrating the impacts of leveraging Internet-scale compromised IoT devices. In this …
demonstrating the impacts of leveraging Internet-scale compromised IoT devices. In this …
The case for retraining of ML models for IoT device identification at the edge
Internet-of-Things (IoT) devices are known to be the source of many security problems, and
as such they would greatly benefit from automated management. This requires robustly …
as such they would greatly benefit from automated management. This requires robustly …
Ip-based iot device detection
H Guo, J Heidemann - Proceedings of the 2018 workshop on IoT …, 2018 - dl.acm.org
Recent IoT-based DDoS attacks have exposed how vulnerable the Internet can be to
millions of insufficiently secured IoT devices. To understand the risks of these attacks …
millions of insufficiently secured IoT devices. To understand the risks of these attacks …