Detecting compromised IoT devices: Existing techniques, challenges, and a way forward

I Makhdoom, M Abolhasan, D Franklin, J Lipman… - Computers & …, 2023 - Elsevier
IoT devices, whether connected to the Internet or operating in a private network, are
vulnerable to cyber attacks from external or internal attackers or insiders who may succeed …

HADES-IoT: A practical and effective host-based anomaly detection system for IoT devices (extended version)

D Breitenbacher, I Homoliak, YL Aung… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) devices have become ubiquitous, with applications in many domains,
including industry, transportation, and healthcare; these devices also have many household …

Bota: Explainable iot malware detection in large networks

D Uhříček, K Hynek, T Čejka… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
Explainability and alert reasoning are essential but often neglected properties of intrusion
detection systems. The lack of explainability reduces security personnel's trust, limiting the …

Securing IOT devices against emerging security threats: Challenges and mitigation techniques

M Aziz Al Kabir, W Elmedany… - Journal of Cyber Security …, 2023 - Taylor & Francis
The increasing prevalence of IoT devices has brought about numerous security challenges
due to their relatively simple internal architecture and low-powered hardware warranted by …

HADES-IoT: A practical host-based anomaly detection system for IoT devices

D Breitenbacher, I Homoliak, YL Aung… - Proceedings of the …, 2019 - dl.acm.org
Internet of Things (IoT) devices have become ubiquitous and spread across many
application domains including the industry, transportation, healthcare, and households …

IoT-botnet detection and isolation by access routers

C Dietz, RL Castro, J Steinberger… - … Conference on the …, 2018 - ieeexplore.ieee.org
In recent years, emerging technologies such as the Internet of Things gain increasing
interest in various communities. However, the majority of IoT devices have little or no …

Us-aid: Unattended scalable attestation of iot devices

A Ibrahim, AR Sadeghi, G Tsudik - 2018 IEEE 37th Symposium …, 2018 - ieeexplore.ieee.org
Embedded devices, personal gadgets and networks thereof are becoming increasingly
pervasive, mainly due the advent of, and hype surrounding, the so-called Internet of Things …

Internet of Things security and forensics: Challenges and opportunities

M Conti, A Dehghantanha, K Franke… - Future Generation …, 2018 - Elsevier
Abstract The Internet of Things (IoT) envisions pervasive, connected, and smart nodes
interacting autonomously while offering all sorts of services. Wide distribution, openness and …

N-baiot—network-based detection of iot botnet attacks using deep autoencoders

Y Meidan, M Bohadana, Y Mathov… - IEEE Pervasive …, 2018 - ieeexplore.ieee.org
The proliferation of IoT devices that can be more easily compromised than desktop
computers has led to an increase in IoT-based botnet attacks. To mitigate this threat, there is …

[PDF][PDF] Designing an effective network forensic framework for the investigation of botnets in the Internet of Things

N Koroniotis - 2020 - unsworks.unsw.edu.au
In recent times, the world has come to rely greatly on the Internet and the services that it
provides. As such, it should come as no surprise that innovations that harness the …