4.6 Article

Improving Network-Based Anomaly Detection in Smart Home Environment

Related references

Note: Only part of the references are listed.
Article Automation & Control Systems

Deep Learning Based Attack Detection for Cyber-Physical System Cybersecurity: A Survey

Jun Zhang et al.

Summary: With the increasing cyber attacks against cyber-physical systems, the use of deep learning methods in detecting these attacks is explored in this survey. A six-step methodology is provided for summarizing and analyzing the literature on applying deep learning methods for cyber attack detection. The survey reveals the great potential of deep learning modules in detecting cyber attacks against CPS systems, with excellent performance achieved partly due to the availability of high-quality datasets. The survey also identifies challenges, opportunities, and future research trends in this area.

IEEE-CAA JOURNAL OF AUTOMATICA SINICA (2022)

Article Computer Science, Information Systems

Towards Secure Fog Computing: A Survey on Trust Management, Privacy, Authentication, Threats and Access Control

Abdullah Al-Noman Patwary et al.

Summary: Fog computing is an emerging computing paradigm that has gained attention in recent years for deploying IoT applications. Security and privacy concerns, including authentication, threats, access control, and privacy protection techniques, need to be addressed to ensure the necessary level of trust in Fog devices. Various research challenges and directions for future study in the field of secure Fog computing are discussed in the context of Blockchain-based solutions.

ELECTRONICS (2021)

Article Computer Science, Theory & Methods

Machine Learning-based Cyber Attacks Targeting on Controlled Information: A Survey

Yuantian Miao et al.

Summary: In recent years, stealing attacks against controlled information using machine learning algorithms have emerged as a significant cyber security threat, making detection and defense challenging and urgent. This survey reviews the recent advances in this type of attack, categorizes them into three types based on the targeted controlled information, and proposes countermeasures focusing on detection, disruption, and isolation for effective protection.

ACM COMPUTING SURVEYS (2021)

Article Automation & Control Systems

Cyber Vulnerability Intelligence for Internet of Things Binary

Shigang Liu et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

Article Computer Science, Information Systems

A Two-Level Flow-Based Anomalous Activity Detection System for IoT Networks

Imtiaz Ullah et al.

ELECTRONICS (2020)

Article Computer Science, Information Systems

Scalable Data Storage Design for Nonstationary IoT Environment With Adaptive Security and Reliability

Andrei Tchernykh et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Computer Science, Information Systems

Security Analysis of Network Anomalies Mitigation Schemes in IoT Networks

Muhammad Aminu Lawal et al.

IEEE ACCESS (2020)

Proceedings Paper Computer Science, Hardware & Architecture

HOMESNITCH: Behavior Transparency and Control for Smart Home IoT Devices

T. J. OConnor et al.

PROCEEDINGS OF THE 2019 CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '19) (2019)

Proceedings Paper Computer Science, Information Systems

Cracking IoT Device User Account via Brute-force Attack to SMS Authentication Code

Dong Wang et al.

PROCEEDINGS OF THE FIRST WORKSHOP ON RADICAL AND EXPERIENTIAL SECURITY (RESEC'18) (2018)

Article Computer Science, Hardware & Architecture

Botnets and Internet of Things Security

Elisa Bertino et al.

COMPUTER (2017)

Proceedings Paper Computer Science, Hardware & Architecture

Technical Aspects of Cyber Kill Chain

Tarun Yadav et al.

SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015) (2015)

Article Computer Science, Information Systems

An Overview of IP Flow-Based Intrusion Detection

Anna Sperotto et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2010)

Article Computer Science, Theory & Methods

Anomaly detection

Varun Chandola et al.

ACM COMPUTING SURVEYS (2009)