A survey of public IoT datasets for network security research
F De Keersmaeker, Y Cao… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Publicly available datasets are an indispensable tool for researchers, as they allow testing
new algorithms on a wide range of different scenarios and making scientific experiments …
new algorithms on a wide range of different scenarios and making scientific experiments …
Towards continuous threat defense: In-network traffic analysis for IoT gateways
The widespread use of IoT devices has unveiled overlooked security risks. With the advent
of ultrareliable low-latency communications (URLLCs) in 5G, fast threat defense is critical to …
of ultrareliable low-latency communications (URLLCs) in 5G, fast threat defense is critical to …
M2VT-IDS: A multi-task multi-view learning architecture for designing IoT intrusion detection system
With the rapidly growing frequency of security incidents in the Internet of Things (IoT),
intrusion detection systems (IDS) have gained increasing attention in recent years. They …
intrusion detection systems (IDS) have gained increasing attention in recent years. They …
Combining device Behavioral models and building schema for cybersecurity of large-scale IoT infrastructure
A Hamza, HH Gharakheili, T Pering… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
Modern buildings are increasingly getting connected by adopting a range of IoT devices and
applications from video surveillance and lighting to people counting and access control. It …
applications from video surveillance and lighting to people counting and access control. It …
Efficient IoT traffic inference: From multi-view classification to progressive monitoring
A Pashamokhtari, G Batista… - ACM Transactions on …, 2023 - dl.acm.org
Machine learning-based techniques have proven to be effective in Internet-of-Things (IoT)
network behavioral inference. Existing works developed data-driven models based on …
network behavioral inference. Existing works developed data-driven models based on …
CADeSH: Collaborative anomaly detection for smart homes
Y Meidan, D Avraham, H Libhaber… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
Although home Internet of Things (IoT) devices are typically plain and task oriented, the
context of their daily use may affect their traffic patterns. That is, a given IoT device will …
context of their daily use may affect their traffic patterns. That is, a given IoT device will …
AdIoTack: Quantifying and refining resilience of decision tree ensemble inference models against adversarial volumetric attacks on IoT networks
Abstract Machine Learning-based techniques have shown success in cyber intelligence.
However, they are increasingly becoming targets of sophisticated data-driven adversarial …
However, they are increasingly becoming targets of sophisticated data-driven adversarial …
P4pir: in-network analysis for smart iot gateways
IoT gateways are vital to the scalability and security of IoT networks. As more devices
connect to the network, traditional hard-coded gateways fail to flexibly process diverse IoT …
connect to the network, traditional hard-coded gateways fail to flexibly process diverse IoT …
Dynamic Inference from IoT Traffic Flows under Concept Drifts in Residential ISP Networks
A Pashamokhtari, N Okui, M Nakahara… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
Millions of vulnerable consumer IoT devices in home networks are the enabler for cyber
crimes putting user privacy and Internet security at risk. Internet service providers (ISPs) are …
crimes putting user privacy and Internet security at risk. Internet service providers (ISPs) are …
Combining stochastic and deterministic modeling of IPFIX records to infer connected IoT devices in residential ISP networks
A Pashamokhtari, N Okui, Y Miyake… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
Residential Internet service providers (ISPs) today have limited device-level visibility into
subscriber houses, primarily due to the network address translation (NAT) technology. The …
subscriber houses, primarily due to the network address translation (NAT) technology. The …