Proceedings of the 14th International Conference on Availability, Reliability and Security 2019
DOI: 10.1145/3339252.3339272
|View full text |Cite
|
Sign up to set email alerts
|

Data-driven Curation, Learning and Analysis for Inferring Evolving IoT Botnets in the Wild

Abstract: The insecurity of the Internet-of-Things (IoT) paradigm continues to wreak havoc in consumer and critical infrastructure realms. Several challenges impede addressing IoT security at large, including, the lack of IoT-centric data that can be collected, analyzed and correlated, due to the highly heterogeneous nature of such devices and their widespread deployments in Internet-wide environments. To this end, this paper explores macroscopic, passive empirical data to shed light on this evolving threat phenomena. T… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(4 citation statements)
references
References 35 publications
0
4
0
Order By: Relevance
“…Inevitably, this is associated with an increased risk of privacy violations (Crossler and Bélanger, 2019;Gerhart and Koohikamali, 2019). Thus, the lack of basic security regulations on online platforms (Pour et al, 2019) fuels privacy concerns, as users' private information may become exposed (Malm, 2018) and their anonymity could become compromised-only 15 demographic features are needed to correctly identify an individual based on online data (Rocher et al, 2019).…”
Section: Health Information Privacy Concerns and Online Engagementmentioning
confidence: 99%
“…Inevitably, this is associated with an increased risk of privacy violations (Crossler and Bélanger, 2019;Gerhart and Koohikamali, 2019). Thus, the lack of basic security regulations on online platforms (Pour et al, 2019) fuels privacy concerns, as users' private information may become exposed (Malm, 2018) and their anonymity could become compromised-only 15 demographic features are needed to correctly identify an individual based on online data (Rocher et al, 2019).…”
Section: Health Information Privacy Concerns and Online Engagementmentioning
confidence: 99%
“…The important thing about data is that 90% of data are generated after 2016, and 50% of these data are produced by Mobile and Internet of Things (IoT) devices ( Marr, 2018 ). Since these devices lack security protocols, so these devices are mainly involved in privacy breaches and violations ( Pour et al, 2019 ). The critical development in data collection is that it is no longer dependent on direct interactions as third-party data collection and secondary data usage have seen a significant rise ( King and Forder, 2016 ).…”
Section: Literature Review and Hypothesis Developmentmentioning
confidence: 99%
“…The original probabilistic model in [68] was designed to clean irrelevant flow by eliminating noise samples, such as misconfigured traffic. Then, multiple low and deep learning models were tested in an endeavor to create an efficient multi-window convolutional neural network.…”
Section: Ai-based Deep Learningmentioning
confidence: 99%