Detecting compromised IoT devices: Existing techniques, challenges, and a way forward
IoT devices, whether connected to the Internet or operating in a private network, are
vulnerable to cyber attacks from external or internal attackers or insiders who may succeed …
vulnerable to cyber attacks from external or internal attackers or insiders who may succeed …
HADES-IoT: A practical and effective host-based anomaly detection system for IoT devices (extended version)
Internet of Things (IoT) devices have become ubiquitous, with applications in many domains,
including industry, transportation, and healthcare; these devices also have many household …
including industry, transportation, and healthcare; these devices also have many household …
Bota: Explainable iot malware detection in large networks
Explainability and alert reasoning are essential but often neglected properties of intrusion
detection systems. The lack of explainability reduces security personnel's trust, limiting the …
detection systems. The lack of explainability reduces security personnel's trust, limiting the …
Securing IOT devices against emerging security threats: Challenges and mitigation techniques
M Aziz Al Kabir, W Elmedany… - Journal of Cyber Security …, 2023 - Taylor & Francis
The increasing prevalence of IoT devices has brought about numerous security challenges
due to their relatively simple internal architecture and low-powered hardware warranted by …
due to their relatively simple internal architecture and low-powered hardware warranted by …
HADES-IoT: A practical host-based anomaly detection system for IoT devices
Internet of Things (IoT) devices have become ubiquitous and spread across many
application domains including the industry, transportation, healthcare, and households …
application domains including the industry, transportation, healthcare, and households …
IoT-botnet detection and isolation by access routers
In recent years, emerging technologies such as the Internet of Things gain increasing
interest in various communities. However, the majority of IoT devices have little or no …
interest in various communities. However, the majority of IoT devices have little or no …
Us-aid: Unattended scalable attestation of iot devices
Embedded devices, personal gadgets and networks thereof are becoming increasingly
pervasive, mainly due the advent of, and hype surrounding, the so-called Internet of Things …
pervasive, mainly due the advent of, and hype surrounding, the so-called Internet of Things …
Internet of Things security and forensics: Challenges and opportunities
Abstract The Internet of Things (IoT) envisions pervasive, connected, and smart nodes
interacting autonomously while offering all sorts of services. Wide distribution, openness and …
interacting autonomously while offering all sorts of services. Wide distribution, openness and …
N-baiot—network-based detection of iot botnet attacks using deep autoencoders
The proliferation of IoT devices that can be more easily compromised than desktop
computers has led to an increase in IoT-based botnet attacks. To mitigate this threat, there is …
computers has led to an increase in IoT-based botnet attacks. To mitigate this threat, there is …
[PDF][PDF] Designing an effective network forensic framework for the investigation of botnets in the Internet of Things
N Koroniotis - 2020 - unsworks.unsw.edu.au
In recent times, the world has come to rely greatly on the Internet and the services that it
provides. As such, it should come as no surprise that innovations that harness the …
provides. As such, it should come as no surprise that innovations that harness the …