2021
DOI: 10.1109/comst.2021.3064259
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Device Behavior Fingerprinting: Data Sources, Techniques, Application Scenarios, and Datasets

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
42
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 95 publications
(42 citation statements)
references
References 155 publications
0
42
0
Order By: Relevance
“…1) The data set of legitimate IoT and anomalous DDoS traffic generated in this research will be made publicly available to the broad scientific community (and there is a lack of such data sets in [7]-see also the second section). 2) Our defined process of forming normal traffic profiles for classes of IoT devices.…”
Section: Introductionmentioning
confidence: 99%
“…1) The data set of legitimate IoT and anomalous DDoS traffic generated in this research will be made publicly available to the broad scientific community (and there is a lack of such data sets in [7]-see also the second section). 2) Our defined process of forming normal traffic profiles for classes of IoT devices.…”
Section: Introductionmentioning
confidence: 99%
“…Traditional AI techniques have been widely applied in the literature to detect cybersecurity issues in IoT scenarios. In [3], existing works on device behavior fingerprinting were surveyed, including those targeting IoT security. This work shows how IoT security solutions are turning nowadays towards the application of ML and DL techniques.…”
Section: Artificial Intelligence For Iot Cybersecuritymentioning
confidence: 99%
“…One strategy that has gained relevance when detecting devices that have been corrupted by malware is monitoring device activities to generate behavioral fingerprints or profiles. Fingerprints can be utilized to detect deviations caused by cyberattacks or malicious software modifications [3]. In IoT devices, heterogeneous behavior sources can be monitored, such as network communications, resource consumption, software actions and events, or users' interactions.…”
Section: Introductionmentioning
confidence: 99%
“…Continuous Authentication (CA) is one of the main emergent techniques from the BAD-based security approach. Also known as permanent authentication, CA is supposed to increase the level of security by keeping SHS users authenticated permanently and enhance the users' quality of experience by being non-intrusive and minimizing the usage of credentials during the authentication processes [38]. User cyber behavior-based authentication is a category of CA.…”
Section: Existing Approaches For Securing User-driven Operation Of Iot-based Shssmentioning
confidence: 99%