[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Kolcun et al., 2023 - Google Patents

Scalable Device Identification for IoT Networks using Binary Classification Models at the Edge

Kolcun et al., 2023

View PDF
Document ID
1057300511914830898
Author
Kolcun R
Mortier R
Publication year

External Links

Snippet

With the proliferation of IoT devices in households, network-level management is essential for users' security and control. Identifying IoT devices through their network profiles enables the detection of anomalies, such as hacking attempts, misconfigurations, or firmware …
Continue reading at www.repository.cam.ac.uk (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection

Similar Documents

Publication Publication Date Title
CN111092852B (en) Network security monitoring method, device, equipment and storage medium based on big data
Samarakoon et al. 5g-nidd: A comprehensive network intrusion detection dataset generated over 5g wireless network
US10200382B2 (en) System and method for detecting abnormal traffic behavior using infinite decaying clusters
US9386028B2 (en) System and method for malware detection using multidimensional feature clustering
Yang et al. Robust detection of false data injection attacks for data aggregation in an Internet of Things-based environmental surveillance
Ma et al. Pinpointing hidden IoT devices via spatial-temporal traffic fingerprinting
US20220086071A1 (en) A network device classification apparatus and process
Kolcun et al. Revisiting iot device identification
Ujjan et al. Suspicious traffic detection in SDN with collaborative techniques of snort and deep neural networks
Amoli et al. A real time unsupervised NIDS for detecting unknown and encrypted network attacks in high speed network
Alserhani et al. MARS: multi-stage attack recognition system
Ashibani et al. A behavior profiling model for user authentication in IoT networks based on app usage patterns
Kolcun et al. The case for retraining of ML models for IoT device identification at the edge
Greensmith et al. The DCA: SOMe comparison: A comparative study between two biologically inspired algorithms
EP4381690A1 (en) Network access anomaly detection via graph embedding
He et al. AppFA: a novel approach to detect malicious android applications on the network
Stevanovic et al. Next generation application-layer DDoS defences: applying the concepts of outlier detection in data streams with concept drift
Liu et al. Real-time diagnosis of network anomaly based on statistical traffic analysis
Daneshgadeh et al. An empirical investigation of DDoS and Flash event detection using Shannon entropy, KOAD and SVM combined
Thompson et al. Rapid IoT device identification at the edge
Lightbody et al. Host-based intrusion detection system for IOT using convolutional neural networks
Kolcun et al. Scalable Device Identification for IoT Networks using Binary Classification Models at the Edge
Alsumaidaie et al. An Assessment of Ensemble Voting Approaches, Random Forest, and Decision Tree Techniques in Detecting Distributed Denial of Service (DDoS) Attacks
Catalin et al. An efficient method in pre-processing phase of mining suspicious web crawlers
Daneshgadeh et al. A hybrid approach to detect DDoS attacks using KOAD and the Mahalanobis distance