2020 International Conference on INnovations in Intelligent SysTems and Applications (INISTA) 2020
DOI: 10.1109/inista49547.2020.9194689
|View full text |Cite
|
Sign up to set email alerts
|

A Lightweight Cyber-Security Defense Framework for Smart Homes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 26 publications
0
3
0
Order By: Relevance
“…For example, Gajewski et al [101] proposed a two-tier intrusion detection mechanism that used machine learning to combine anomaly detection at local level in each home combined with global anomaly detection across homes conducted by the network service provider. Likewise, deep learning approaches to detect IoT device anomalies have been proposed [102][103][104][105]. Similarly, Pan et al [106] implemented a context aware intrusion detection framework that could accurately find and classify various kinds of Building Automation and Control Networking protocol (BacNet) attacks.…”
Section: ) Rq1: Smart Home Device Securitymentioning
confidence: 99%
“…For example, Gajewski et al [101] proposed a two-tier intrusion detection mechanism that used machine learning to combine anomaly detection at local level in each home combined with global anomaly detection across homes conducted by the network service provider. Likewise, deep learning approaches to detect IoT device anomalies have been proposed [102][103][104][105]. Similarly, Pan et al [106] implemented a context aware intrusion detection framework that could accurately find and classify various kinds of Building Automation and Control Networking protocol (BacNet) attacks.…”
Section: ) Rq1: Smart Home Device Securitymentioning
confidence: 99%
“…To the best of our knowledge, this is the first smart-home traffic data-set containing data from multiple various wireless protocols on the same real-world installation. The compiled GHOST-IoT-data-set enabled the testing and evaluation of the GHOST modules which deal with anomaly detection and identification of abnormal incidents within a smart-home ecosystem [ 26 ]. Furthermore, it can be used for the validation of techniques focusing on the analysis of users’ normal and abnormal behavior, for anomaly detection of network traffic, detection of specific to IoT attacks, such as physical access attacks, and similar research efforts.…”
Section: Discussionmentioning
confidence: 99%
“…5 depicts the tested IoT system. For example, Agmon et al [13], Sachidananda et al [41], and Spanos et al [42] use the number of hosts as IVs; however, the number of exploits and coverage discovered for each host is the focus of the measurement.…”
Section: Iot Systems Testedmentioning
confidence: 99%
“…Spanos et al [42] proposed a mechanism for anomaly detection by combining ML and statistical methodologies to detect network traffic time series risks. The framework is a lightweight cybersecurity solution for IoT-based edge computing.…”
Section: Vulnerability Detection and Response Formulationmentioning
confidence: 99%