A survey of public IoT datasets for network security research

F De Keersmaeker, Y Cao… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Publicly available datasets are an indispensable tool for researchers, as they allow testing
new algorithms on a wide range of different scenarios and making scientific experiments …

Towards continuous threat defense: In-network traffic analysis for IoT gateways

M Zang, C Zheng, L Dittmann… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
The widespread use of IoT devices has unveiled overlooked security risks. With the advent
of ultrareliable low-latency communications (URLLCs) in 5G, fast threat defense is critical to …

M2VT-IDS: A multi-task multi-view learning architecture for designing IoT intrusion detection system

F Nie, W Liu, G Liu, B Gao - Internet of Things, 2024 - Elsevier
With the rapidly growing frequency of security incidents in the Internet of Things (IoT),
intrusion detection systems (IDS) have gained increasing attention in recent years. They …

Combining device Behavioral models and building schema for cybersecurity of large-scale IoT infrastructure

A Hamza, HH Gharakheili, T Pering… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
Modern buildings are increasingly getting connected by adopting a range of IoT devices and
applications from video surveillance and lighting to people counting and access control. It …

Efficient IoT traffic inference: From multi-view classification to progressive monitoring

A Pashamokhtari, G Batista… - ACM Transactions on …, 2023 - dl.acm.org
Machine learning-based techniques have proven to be effective in Internet-of-Things (IoT)
network behavioral inference. Existing works developed data-driven models based on …

CADeSH: Collaborative anomaly detection for smart homes

Y Meidan, D Avraham, H Libhaber… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
Although home Internet of Things (IoT) devices are typically plain and task oriented, the
context of their daily use may affect their traffic patterns. That is, a given IoT device will …

AdIoTack: Quantifying and refining resilience of decision tree ensemble inference models against adversarial volumetric attacks on IoT networks

A Pashamokhtari, G Batista, HH Gharakheili - Computers & Security, 2022 - Elsevier
Abstract Machine Learning-based techniques have shown success in cyber intelligence.
However, they are increasingly becoming targets of sophisticated data-driven adversarial …

P4pir: in-network analysis for smart iot gateways

M Zang, C Zheng, R Stoyanov, L Dittmann… - Proceedings of the …, 2022 - dl.acm.org
IoT gateways are vital to the scalability and security of IoT networks. As more devices
connect to the network, traditional hard-coded gateways fail to flexibly process diverse IoT …

Dynamic Inference from IoT Traffic Flows under Concept Drifts in Residential ISP Networks

A Pashamokhtari, N Okui, M Nakahara… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
Millions of vulnerable consumer IoT devices in home networks are the enabler for cyber
crimes putting user privacy and Internet security at risk. Internet service providers (ISPs) are …

Combining stochastic and deterministic modeling of IPFIX records to infer connected IoT devices in residential ISP networks

A Pashamokhtari, N Okui, Y Miyake… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
Residential Internet service providers (ISPs) today have limited device-level visibility into
subscriber houses, primarily due to the network address translation (NAT) technology. The …