2013
DOI: 10.1007/s00779-013-0711-x
|View full text |Cite
|
Sign up to set email alerts
|

Characterizing home network traffic: an inside view

Abstract: Abstract. The rapid spread of residential broadband connections and Internet-capable consumer devices in home networks has changed the landscape of Internet traffic. To gain a deep understanding of Internet traffic for home networks, this paper develops a traffic monitoring platform that collects and analyzes home network traffic via programmable home routers and traffic profiling servers. Using traffic data captured from real home networks, we present traffic characteristics in home networks, and then apply p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
4
3

Relationship

3
4

Authors

Journals

citations
Cited by 16 publications
(8 citation statements)
references
References 26 publications
0
8
0
Order By: Relevance
“…As several home appliances, such as air conditioners, heaters, and refrigerators, are being connected to the Internet, and they became targets of cyberattacks [6], [7], which can cause serious problems such as compromising safety and even harming users [15]. Therefore, the methods to detect attacks for the home IoT devices have been proposed [10]- [14]. For example, Hodo et al proposed a method to detect intruded IoT devices.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…As several home appliances, such as air conditioners, heaters, and refrigerators, are being connected to the Internet, and they became targets of cyberattacks [6], [7], which can cause serious problems such as compromising safety and even harming users [15]. Therefore, the methods to detect attacks for the home IoT devices have been proposed [10]- [14]. For example, Hodo et al proposed a method to detect intruded IoT devices.…”
Section: Related Workmentioning
confidence: 99%
“…Most of the current attacks targeting IoT devices aim to create botnets [8], [9]. Such attacks are detectable by methods based on analyses of attacker behaviors [10]- [12] or through usual traffic comparisons [13], [14].…”
Section: Introductionmentioning
confidence: 99%
“…However, as we observe, the majority of them focus on the IP-based networks, and neglect to consider other wireless protocol. In a preliminary work, Xu et al [8] developed a monitoring platform to capture network traffic from IP-based IoT devices within a smart-home network. They grouped the packets into flows and exported for each flow useful aggregated attributes such as source and destination IP addresses, ports, protocol, number of packets and bytes.…”
Section: Toolsmentioning
confidence: 99%
“…The recent growth of traffic, applications and connected devices in the digital homes have attracted a rich body of research on residential broadband networks and home networks . A number of studies have focused on end‐to‐end performance in home networks, while are devoted to the characterization, measurement, monitoring, and diagnosis of traffic, gateways, and connected devices in residential home networks.…”
Section: Related Workmentioning
confidence: 99%