Blocking without breaking: Identification and mitigation of non-essential iot traffic

AM Mandalari, DJ Dubois, R Kolcun… - arXiv preprint arXiv …, 2021 - arxiv.org
Despite the prevalence of Internet of Things (IoT) devices, there is little information about the
purpose and risks of the Internet traffic these devices generate, and consumers have limited …

An analysis of home IoT network traffic and behaviour

Y Amar, H Haddadi, R Mortier, A Brown… - arXiv preprint arXiv …, 2018 - arxiv.org
Internet-connected devices are increasingly present in our homes, and privacy breaches,
data thefts, and security threats are becoming commonplace. In order to avoid these, we …

A haystack full of needles: Scalable detection of iot devices in the wild

SJ Saidi, AM Mandalari, R Kolcun, H Haddadi… - Proceedings of the …, 2020 - dl.acm.org
Consumer Internet of Things (IoT) devices are extremely popular, providing users with rich
and diverse functionalities, from voice assistants to home appliances. These functionalities …

IoT behavioral monitoring via network traffic analysis

A Sivanathan - arXiv preprint arXiv:2001.10632, 2020 - arxiv.org
Smart homes, enterprises, and cities are increasingly being equipped with a plethora of
Internet of Things (IoT), ranging from smart-lights to security cameras. While IoT networks …

Clear as MUD: Generating, validating and applying IoT behavioral profiles

A Hamza, D Ranathunga, HH Gharakheili… - Proceedings of the …, 2018 - dl.acm.org
IoT devices are increasingly being implicated in cyber-attacks, raising community concern
about the risks they pose to critical infrastructure, corporations, and citizens. In order to …

Revisiting iot device identification

R Kolcun, DA Popescu, V Safronov, P Yadav… - arXiv preprint arXiv …, 2021 - arxiv.org
Internet-of-Things (IoT) devices are known to be the source of many security problems, and
as such, they would greatly benefit from automated management. This requires robustly …

Internet-scale insecurity of consumer internet of things: An empirical measurements perspective

A Mangino, MS Pour, E Bou-Harb - ACM Transactions on Management …, 2020 - dl.acm.org
The number of Internet-of-Things (IoT) devices actively communicating across the Internet is
continually increasing, as these devices are deployed across a variety of sectors, constantly …

Inferring, characterizing, and investigating internet-scale malicious iot device activities: A network telescope perspective

S Torabi, E Bou-Harb, C Assi… - 2018 48th Annual …, 2018 - ieeexplore.ieee.org
Recent attacks have highlighted the insecurity of the Internet of Things (IoT) paradigm by
demonstrating the impacts of leveraging Internet-scale compromised IoT devices. In this …

The case for retraining of ML models for IoT device identification at the edge

R Kolcun, DA Popescu, V Safronov, P Yadav… - arXiv preprint arXiv …, 2020 - arxiv.org
Internet-of-Things (IoT) devices are known to be the source of many security problems, and
as such they would greatly benefit from automated management. This requires robustly …

Ip-based iot device detection

H Guo, J Heidemann - Proceedings of the 2018 workshop on IoT …, 2018 - dl.acm.org
Recent IoT-based DDoS attacks have exposed how vulnerable the Internet can be to
millions of insufficiently secured IoT devices. To understand the risks of these attacks …