Kolcun et al., 2023 - Google Patents
Scalable Device Identification for IoT Networks using Binary Classification Models at the EdgeKolcun et al., 2023
View PDF- Document ID
- 1057300511914830898
- Author
- Kolcun R
- Mortier R
- Publication year
External Links
Snippet
With the proliferation of IoT devices in households, network-level management is essential for users' security and control. Identifying IoT devices through their network profiles enables the detection of anomalies, such as hacking attempts, misconfigurations, or firmware …
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111092852B (en) | Network security monitoring method, device, equipment and storage medium based on big data | |
Samarakoon et al. | 5g-nidd: A comprehensive network intrusion detection dataset generated over 5g wireless network | |
US10200382B2 (en) | System and method for detecting abnormal traffic behavior using infinite decaying clusters | |
US9386028B2 (en) | System and method for malware detection using multidimensional feature clustering | |
Yang et al. | Robust detection of false data injection attacks for data aggregation in an Internet of Things-based environmental surveillance | |
Ma et al. | Pinpointing hidden IoT devices via spatial-temporal traffic fingerprinting | |
US20220086071A1 (en) | A network device classification apparatus and process | |
Kolcun et al. | Revisiting iot device identification | |
Ujjan et al. | Suspicious traffic detection in SDN with collaborative techniques of snort and deep neural networks | |
Amoli et al. | A real time unsupervised NIDS for detecting unknown and encrypted network attacks in high speed network | |
Alserhani et al. | MARS: multi-stage attack recognition system | |
Ashibani et al. | A behavior profiling model for user authentication in IoT networks based on app usage patterns | |
Kolcun et al. | The case for retraining of ML models for IoT device identification at the edge | |
Greensmith et al. | The DCA: SOMe comparison: A comparative study between two biologically inspired algorithms | |
EP4381690A1 (en) | Network access anomaly detection via graph embedding | |
He et al. | AppFA: a novel approach to detect malicious android applications on the network | |
Stevanovic et al. | Next generation application-layer DDoS defences: applying the concepts of outlier detection in data streams with concept drift | |
Liu et al. | Real-time diagnosis of network anomaly based on statistical traffic analysis | |
Daneshgadeh et al. | An empirical investigation of DDoS and Flash event detection using Shannon entropy, KOAD and SVM combined | |
Thompson et al. | Rapid IoT device identification at the edge | |
Lightbody et al. | Host-based intrusion detection system for IOT using convolutional neural networks | |
Kolcun et al. | Scalable Device Identification for IoT Networks using Binary Classification Models at the Edge | |
Alsumaidaie et al. | An Assessment of Ensemble Voting Approaches, Random Forest, and Decision Tree Techniques in Detecting Distributed Denial of Service (DDoS) Attacks | |
Catalin et al. | An efficient method in pre-processing phase of mining suspicious web crawlers | |
Daneshgadeh et al. | A hybrid approach to detect DDoS attacks using KOAD and the Mahalanobis distance |