NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium 2020
DOI: 10.1109/noms47738.2020.9110433
|View full text |Cite
|
Sign up to set email alerts
|

Unsupervised Detection of Anomalous Behavior in Wireless Devices based on Auto-Encoders

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(8 citation statements)
references
References 18 publications
0
2
0
Order By: Relevance
“…In addition, the gadgets are inherently insecure since they need a constant Inter-net connection. New instances and studies show that greater investigation is required [22]. They also reveal, sadly, that present solutions are far from being acceptable to halt the exponential development in the number and complexity of assaults [24].…”
Section: Background and Literature Reviewmentioning
confidence: 99%
See 2 more Smart Citations
“…In addition, the gadgets are inherently insecure since they need a constant Inter-net connection. New instances and studies show that greater investigation is required [22]. They also reveal, sadly, that present solutions are far from being acceptable to halt the exponential development in the number and complexity of assaults [24].…”
Section: Background and Literature Reviewmentioning
confidence: 99%
“…Numerous attacks have been made against the Internet of Things (IoT), including notable Distributed Denial of Service (DDoS) attacks on Dyn's DNS (domain name system; see reference). [20]Attacks/vulnerabilities on/off self-driving cars [21], ransomware attacks [21], attacks on smart home and medical equipment [22,23], and more. The IoT and critical infrastructures pose new security threats.…”
Section: Background and Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Heuristic-based methods provided a layer of detection by identifying suspicious behaviors not explicitly defined in existing rules [12]. Behavioral profiling techniques, which involved creating detailed profiles of legitimate application behavior, enabled the detection of deviations indicative of malware [13]. The integration of contextaware features, such as user behavior and environmental factors, further enhanced the precision of detection models [14].…”
Section: Related Studiesmentioning
confidence: 99%
“…Some studies focused on developing machine learning models that predict ransomware activity based on app behavior patterns [13,27]. The integration of cloud-based services for off-device analysis was also proposed to limit the impact on device performance [36,37]. Data backup strategies have been highlighted as a crucial mitigation technique, ensuring data recovery without paying ransom [38].…”
Section: Mitigation Techniquesmentioning
confidence: 99%