The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2015 IEEE/ACS 12th International Conference of Computer Systems and Applications (AICCSA) 2015
DOI: 10.1109/aiccsa.2015.7507187
|View full text |Cite
|
Sign up to set email alerts
|

Anomaly Behavior Analysis System for ZigBee in smart buildings

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 12 publications
(9 citation statements)
references
References 9 publications
0
9
0
Order By: Relevance
“…Anomaly-based detection was also adopted by Baalbaki et al [101] for their proposed ZigBee IDS. The system was able to detect different attacks, such as DoS, flooding, and pulse DoS, with a high detection rate and low false positive rate, when compared with signature and specification-based IDS approaches.…”
Section: Ids For Iot Networkmentioning
confidence: 99%
“…Anomaly-based detection was also adopted by Baalbaki et al [101] for their proposed ZigBee IDS. The system was able to detect different attacks, such as DoS, flooding, and pulse DoS, with a high detection rate and low false positive rate, when compared with signature and specification-based IDS approaches.…”
Section: Ids For Iot Networkmentioning
confidence: 99%
“…ARAS datasets contain the ground truth labels for 27 various activities. Each house was equipped with 20 binary sensors of various kinds that communicate wirelessly using the ZigBee protocol (Al Baalbaki et al, 2015). A full month of data that contains the activity labels and the sensor data for both residents was gathered from each home, resulting in a total of two months of data.…”
Section: Data Descriptionmentioning
confidence: 99%
“…Other works focus on the proposal of innovative intrusion detection systems, designed to protect ZigBee based IoT networks. [56] introduces ABAS, an anomaly based protection system analyzing network traffic to classify anomalous behavior, while [57] makes use of machine learning algorithms to detect running attacks. [58] uses fuzzy methods based on a finite state machine to detect possible vulnerabilities.…”
Section: Internet Of Things Network May Adopt Different Communicatiomentioning
confidence: 99%