IEEE INFOCOM 2020 - IEEE Conference on Computer Communications 2020
DOI: 10.1109/infocom41043.2020.9155424
|View full text |Cite
|
Sign up to set email alerts
|

IoTArgos: A Multi-Layer Security Monitoring System for Internet-of-Things in Smart Homes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
18
0
1

Year Published

2021
2021
2023
2023

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 52 publications
(22 citation statements)
references
References 31 publications
0
18
0
1
Order By: Relevance
“…Wan et al [21] introduced IoTArgos, which in addition to supervised classification of the data communications of different smart home devices, has a "second stage" of detection using unsupervised learning for unknown attacks. This is a meaningful direction and has been evaluated on a wide range of COTS smart home devices.…”
Section: B Behaviour-based Smart Home Idsmentioning
confidence: 99%
“…Wan et al [21] introduced IoTArgos, which in addition to supervised classification of the data communications of different smart home devices, has a "second stage" of detection using unsupervised learning for unknown attacks. This is a meaningful direction and has been evaluated on a wide range of COTS smart home devices.…”
Section: B Behaviour-based Smart Home Idsmentioning
confidence: 99%
“…Dessa forma, é possível realizar uma escolha de quais variáveis utilizar, de forma a otimizar a implementação em linha (online), sem comprometer o desempenho da classificação. A proposta IoTArgos implementa um sistema de monitoramento de segurança multi-camadas, que coleta, analisa e caracteriza dados de comunicação de dispositivos IoT heterogêneos através de roteadores domésticos programáveis [Wan et al, 2020]. O sistema IoTArgos executa em 22 redes domésticas de três países diferentes, constituídas de 20 dispositivos IoT com diversas aplicações.…”
Section: A Privacidade Dos Dados Nas Redes 5gunclassified
“…ey built a devicespecific normal behavior model and through the GRU neural network model to detect the deviation of benign flow and malicious flow then isolated Infected devices. For solving the detection of unknown suspicious activities or zero-day attacks, the paper [16] designs a two-stage anomaly detection method based on machine learning. In the first stage, a supervised ML algorithm is used to identify known malicious behaviors.…”
Section: Iot Device Attack and Anomaly Detectionmentioning
confidence: 99%
“…e second type of solutions detects whether the device has been attacked within a period of time [14][15][16]. It usually uses statistical features over a period of time to achieve anomaly detection.…”
Section: Introductionmentioning
confidence: 99%