2020
DOI: 10.1109/tce.2020.2981636
|View full text |Cite
|
Sign up to set email alerts
|

Anomaly Detection in Smart Home Operation From User Behaviors and Home Conditions

Abstract: As several home appliances, such as air conditioners, heaters, and refrigerators, were connecting to the Internet, they became targets of cyberattacks, which cause serious problems such as compromising safety and even harming users. We have proposed a method to detect such attacks based on user behavior. This method models user behavior as sequences of user events including operation of home IoT (Internet of Things) devices and other monitored activities. Considering users behave depending on the condition of … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
43
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
4
1

Relationship

1
9

Authors

Journals

citations
Cited by 81 publications
(43 citation statements)
references
References 19 publications
(25 reference statements)
0
43
0
Order By: Relevance
“…Their method learns sequences of events for a predefined set of conditions and detects attacks by comparing the sequences of events, including the current operation, with the learned sequences. This work was extended in [18] and compared with a technique based on a hidden Markov model. It was tested on four users using smart home devices, but in a laboratory setting.…”
Section: B Behaviour-based Smart Home Idsmentioning
confidence: 99%
“…Their method learns sequences of events for a predefined set of conditions and detects attacks by comparing the sequences of events, including the current operation, with the learned sequences. This work was extended in [18] and compared with a technique based on a hidden Markov model. It was tested on four users using smart home devices, but in a laboratory setting.…”
Section: B Behaviour-based Smart Home Idsmentioning
confidence: 99%
“…The authors in [ 20 , 46 ] improved the k-means clustering scheme for finding DDoS and misdirection attacks. To detect attacks in a home WSN, the authors of [ 47 ] used user-behaviors learning analysis. In [ 18 ], the authors used Restricted Boltzmann Machine-based Clustered IDS (RBC-IDS), a deep learning-based technique for tracking sensitive infrastructure utilizing three hidden layers for potential intruders.…”
Section: Background and Related Workmentioning
confidence: 99%
“…In some papers, a home network is simulated to implement methods for better learning, and this information is used to try to find a priority sequence to the extent that some activities are omitted for better learning and to discuss the accuracy and effectiveness of the proposed methods, a comparison is made with the methods of learning user behavior by Hidden Markov Models (Yamauchi et al, 2020). In some papers, it has an approach similar to the proposed approach of this article, and it has been similar in terms of statistical studies, and this combination of statistical techniques with machine learning techniques is evident.. Those templates are being calculated by combining machine learning techniques and statistical techniques according to their network behaviors in a smart house, so in these method, statistical measurements sometimes are used after processing to build clusters (Fahad, Rajarajan, 2015, Spanos et al, 2019.…”
Section: Related Workmentioning
confidence: 99%