2020
DOI: 10.1109/access.2020.3014619
|View full text |Cite
|
Sign up to set email alerts
|

ARBA: Anomaly and Reputation Based Approach for Detecting Infected IoT Devices

Abstract: Today, cyber attacks are constantly evolving and changing, which makes them harder to detect. In particular, detecting attacks in large-scale networks is very challenging because they require high detection rates under real-time resource constraints. In this paper, we focus on detecting infected Internet of Things (IoT) hosts from domain name system (DNS) traffic data. IoT hosts, such as streaming cameras, printers, air conditioners, are hard to protect, unlike PCs and servers. Enterprises are often unaware of… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 45 publications
0
3
0
Order By: Relevance
“…-Lower performance compared with other classifiers. 95,106,117,120,123,126,129,132,137,142,145,149,151,155,162,164,166,170,171,182,183,186,190,197,204,205 -Easy to implement.…”
Section: Knnmentioning
confidence: 99%
See 1 more Smart Citation
“…-Lower performance compared with other classifiers. 95,106,117,120,123,126,129,132,137,142,145,149,151,155,162,164,166,170,171,182,183,186,190,197,204,205 -Easy to implement.…”
Section: Knnmentioning
confidence: 99%
“…IoT Networks in general Network traffic [105], [107], [109], [110], [111], [115], [116], [118], [119], [120], [126], [127], [129], [132], [136], [137], [139], [140], [142], [145], [146], [147], [149], [151], [153], [154], [158], [159], [162], [165], [166], [175], [178], [182], [183], [185], [186], [187], [190], [192], [194], [195], [196], [199], [200], [201], [202], [204],…”
mentioning
confidence: 99%
“…Developing detection methods for cyber security can be divided broadly into two main approaches: signature-based detection [21]- [23] and anomaly-based detection [7], [15], [24]- [27]. To identify malicious domains, detection methods typically use DNS data, as considered in this paper.…”
Section: B Related Workmentioning
confidence: 99%
“…One of the most popular ways of analyzing DNS traffic is to use passive DNS (pDNS) data (see [12]- [15] and references therein). The analysis is performed offline on a copy of live DNS traffic to study past DNS traffic patterns to evaluate the maliciousness of non-categorized domains.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation