2017 27th International Telecommunication Networks and Applications Conference (ITNAC) 2017
DOI: 10.1109/atnac.2017.8215434
|View full text |Cite
|
Sign up to set email alerts
|

ProFiOt: Abnormal Behavior Profiling (ABP) of IoT devices based on a machine learning approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 25 publications
(12 citation statements)
references
References 5 publications
0
12
0
Order By: Relevance
“…In a previous study [238], the abnormal behaviour of IoT objects was profiled, and the generated dataset from profiling was used to train the classifier to detect abnormal behaviour. The author investigated how a partial variation (assuming that the attacker can utilise such changes for malicious purposes) of sensed data can influence the accuracy of the learning algorithm and used SVM and k-means clustering as experimental cases for examining the impact of such changes on the detection accuracy of both ML algorithms.…”
Section: B Network Layermentioning
confidence: 99%
“…In a previous study [238], the abnormal behaviour of IoT objects was profiled, and the generated dataset from profiling was used to train the classifier to detect abnormal behaviour. The author investigated how a partial variation (assuming that the attacker can utilise such changes for malicious purposes) of sensed data can influence the accuracy of the learning algorithm and used SVM and k-means clustering as experimental cases for examining the impact of such changes on the detection accuracy of both ML algorithms.…”
Section: B Network Layermentioning
confidence: 99%
“…Lee et al [ 88 ] come up with profiling of abnormal activities of IoT devices via the support of a variety of machine learning algorithms. The approach considers signal injection as a threat to IoT and hence finds it as a principal attack in his research.…”
Section: Learning-based Solutions For Securing Iotmentioning
confidence: 99%
“…This approach can be applied when the communication parties share encryption/decryption keys. In symmetric encryption (i.e., block ciphers, stream ciphers and hash functions), the key must be pre- Perception layer Device security -High computation cost -Communication cost is not considered -Storage cost is not considered [103] Network layer Device security -Medium computation cost -Medium communication cost -Storage cost is not considered [104] Network layer Device security -High computation cost -Communication cost is not considered -Storage cost is not considered [105] Network layer Device security -Medium computation cost -Communication cost is not considered -Storage cost is not considered [106] Network layer Device security -Medium computation cost -Communication cost is not considered -Storage cost is not considered [107] Perception layer Device security -High computation cost -Communication cost is not considered -Storage cost is not considered distributed or securely communicated. However, in scalable IoT environments, key management including distribution, agreement, update and revocation remains a meaningful task.…”
Section: Security Challenges and Future Directionsmentioning
confidence: 99%