How machine learning changes the nature of cyberattacks on IoT networks: A survey
The Internet of Things (IoT) has continued gaining in popularity and importance in everyday
life in recent years. However, this development does not only present advantages. Indeed …
life in recent years. However, this development does not only present advantages. Indeed …
Machine learning-powered encrypted network traffic analysis: a comprehensive survey
Traffic analysis is the process of monitoring network activities, discovering specific patterns,
and gleaning valuable information from network traffic. It can be applied in various fields …
and gleaning valuable information from network traffic. It can be applied in various fields …
A survey on IoT platforms: Communication, security, and privacy perspectives
Abstract The Internet of Things (IoT) redefines the way how commodity and industrial tasks
are performed every day. The integration of sensors, lightweight computation, and the …
are performed every day. The integration of sensors, lightweight computation, and the …
Information exposure from consumer iot devices: A multidimensional, network-informed measurement approach
Internet of Things (IoT) devices are increasingly found in everyday homes, providing useful
functionality for devices such as TVs, smart speakers, and video doorbells. Along with their …
functionality for devices such as TVs, smart speakers, and video doorbells. Along with their …
A survey on security and privacy issues in modern healthcare systems: Attacks and defenses
Recent advancements in computing systems and wireless communications have made
healthcare systems more efficient than before. Modern healthcare devices can monitor and …
healthcare systems more efficient than before. Modern healthcare devices can monitor and …
Flowprint: Semi-supervised mobile-app fingerprinting on encrypted network traffic
T Van Ede, R Bortolameotti, A Continella… - Network and distributed …, 2020 - par.nsf.gov
Mobile-application fingerprinting of network traffic is valuable for many security solutions as
it provides insights into the apps active on a network. Unfortunately, existing techniques …
it provides insights into the apps active on a network. Unfortunately, existing techniques …
IoT devices recognition through network traffic analysis
The growing Internet of Things (IoT) market introduces new challenges for network activity
monitoring. Legacy network monitoring is not tailored to cope with the huge diversity of smart …
monitoring. Legacy network monitoring is not tailored to cope with the huge diversity of smart …
A survey on device behavior fingerprinting: Data sources, techniques, application scenarios, and datasets
In the current network-based computing world, where the number of interconnected devices
grows exponentially, their diversity, malfunctions, and cybersecurity threats are increasing at …
grows exponentially, their diversity, malfunctions, and cybersecurity threats are increasing at …
Packet-level signatures for smart home devices
mart home devices are vulnerable to passive inference attacks based on network traffic,
even in the presence of encryption. In this paper, we present PINGPONG, a tool that can …
even in the presence of encryption. In this paper, we present PINGPONG, a tool that can …
A machine learning based framework for IoT device identification and abnormal traffic detection
Network security is a key challenge for the deployment of Internet of Things (IoT). New
attacks have been developed to exploit the vulnerabilities of IoT devices. Moreover, IoT …
attacks have been developed to exploit the vulnerabilities of IoT devices. Moreover, IoT …