4.6 Article

Efficient Approach for Anomaly Detection in IoT Using System Calls

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

Anomaly Detection of System Call Sequence Based on Dynamic Features and Relaxed-SVM

Xiaoyao Liao et al.

Summary: The system call sequences of processes are crucial for host-based anomaly detection. This paper proposes a method based on weighted subsequences and feature vectors to enhance the detection accuracy, achieving promising results in experiments.

SECURITY AND COMMUNICATION NETWORKS (2022)

Review Computer Science, Information Systems

Landscape of IoT security

Andy Aidoo et al.

Summary: The past two decades have seen a rise in production and use of sensing-and connectivity-enabled electronic devices, leading to the formation of the Internet of Things (IoT). Cyberattacks on IoT devices have significant impacts due to their widespread use and interconnectivity. Manufacturers struggle to secure IoT devices properly. Therefore, there is a need to enhance the security measures of IoT.

COMPUTER SCIENCE REVIEW (2022)

Proceedings Paper Computer Science, Interdisciplinary Applications

Fast, Lightweight IoT Anomaly Detection Using Feature Pruning and PCA

John Carter et al.

Summary: Anomaly detection is a method for identifying malware and other anomalies, which can be applied to computing hosts and IoT devices. Using PCA for feature engineering in anomaly detection improves the performance and efficacy of detection models, particularly for resource-constrained IoT devices.

37TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING (2022)

Review Computer Science, Information Systems

Intelligent authentication of 5G healthcare devices: A survey

Ali Hassan Sodhro et al.

Summary: The poor time efficiency and high computational complexity of conventional cryptographic methods make it easy to compromise the authentication of lightweight wearable and healthcare devices. Therefore, intelligent authentication, relying on AI and sufficient network resources, is crucial for securing healthcare devices connected to IoT-5G.

INTERNET OF THINGS (2022)

Article Computer Science, Information Systems

Authentication and Identity Management of IoHT Devices: Achievements, Challenges, and Future Directions

Moustafa Mamdouh et al.

Summary: The Internet of Things (IoT) is a crucial technology in healthcare, increasing efficiency but facing security vulnerabilities. This study focuses on IoT perception layer and offers a comprehensive review of IoHT or IoMT, including device authentication mechanisms and future vision utilizing technologies like AI and blockchain.

COMPUTERS & SECURITY (2021)

Article Computer Science, Theory & Methods

Syscall-BSEM: Behavioral semantics enhancement method of system call sequence for high accurate and robust host intrusion detection

Yifei Zhang et al.

Summary: The paper presents a behavioral semantics enhancement method of system call sequence to improve the robustness of intrusion detection. Experimental results demonstrate that the proposed method outperforms other works significantly in detecting obfuscation attacks.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2021)

Article Automation & Control Systems

A Novel Image Steganography Method for Industrial Internet of Things Security

M. Hassaballah et al.

Summary: This study proposes a steganographic method based on HHO-IWT, which embeds secret data in digital images using a metaheuristic optimization algorithm to ensure information security and privacy in the IIoT environment. Experimental results demonstrate the method's excellent performance in terms of visual quality, payload capacity, and resistance against attacks.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2021)

Article Computer Science, Information Systems

IoT-Praetor: Undesired Behaviors Detection for IoT Devices

Juan Wang et al.

Summary: The IoT devices are vulnerable to security issues due to insecure design and configuration. IoT-Praetor proposes a new DUD model and behavior rule engine to detect malicious behaviors effectively, achieving a high successful detection rate for malicious interaction behaviors.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Computer Science, Information Systems

Intelligence in the Internet of Medical Things era: A systematic review of current and future trends

Fadi Al-Turjman et al.

COMPUTER COMMUNICATIONS (2020)

Article Computer Science, Information Systems

A statistical pattern based feature extraction method on system call traces for anomaly detection

Zhen Liu et al.

INFORMATION AND SOFTWARE TECHNOLOGY (2020)

Review Green & Sustainable Science & Technology

Industry 4.0, digitization, and opportunities for sustainability

Morteza Ghobakhloo

JOURNAL OF CLEANER PRODUCTION (2020)

Article Computer Science, Information Systems

Passban IDS: An Intelligent Anomaly-Based Intrusion Detection System for IoT Edge Devices

Mojtaba Eskandari et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Computer Science, Information Systems

Detecting Behavioral Change of IoT Devices Using Clustering-Based Network Traffic Modeling

Arunan Sivanathan et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Review Computer Science, Information Systems

Anomaly Detection for IoT Time-Series Data: A Survey

Andrew A. Cook et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Proceedings Paper Computer Science, Interdisciplinary Applications

IoT Malware Classification Based on System Calls

Dang Kien Hoang et al.

2020 RIVF INTERNATIONAL CONFERENCE ON COMPUTING & COMMUNICATION TECHNOLOGIES (RIVF 2020) (2020)

Article Computer Science, Theory & Methods

Lightweight collaborative anomaly detection for the IoT using blockchain

Yisroel Mirsky et al.

JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING (2020)

Proceedings Paper Computer Science, Hardware & Architecture

DIoT: A Federated Self-learning Anomaly Detection System for IoT

Thien Duc Nguyen et al.

2019 39TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2019) (2019)

Proceedings Paper Computer Science, Information Systems

HADES-IoT: A Practical Host-Based Anomaly Detection System for IoT Devices

Dominik Breitenbacher et al.

PROCEEDINGS OF THE 2019 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS '19) (2019)

Article Computer Science, Information Systems

BRIoT: Behavior Rune Specification-Based Misbehavior Detection for IoT-Embedded Cyber-Physical Systems

Vishal Sharma et al.

IEEE ACCESS (2019)

Article Computer Science, Hardware & Architecture

DDoS in the IoT: Mirai and Other Botnets

Constantinos Kolias et al.

COMPUTER (2017)

Article Computer Science, Hardware & Architecture

Botnets and Internet of Things Security

Elisa Bertino et al.

COMPUTER (2017)

Editorial Material Engineering, Electrical & Electronic

What Is a Savitzky-Golay Filter?

Ronald W. Schafer

IEEE SIGNAL PROCESSING MAGAZINE (2011)

Article Computer Science, Hardware & Architecture

An overview of anomaly detection techniques: Existing solutions and latest technological trends

Animesh Patcha et al.

COMPUTER NETWORKS (2007)

Article Computer Science, Hardware & Architecture

Robustness of the Markov-chain model for cyber-attack detection

N Ye et al.

IEEE TRANSACTIONS ON RELIABILITY (2004)