2020
DOI: 10.1109/tnsm.2020.2966951
|View full text |Cite
|
Sign up to set email alerts
|

IoT-KEEPER: Detecting Malicious IoT Network Activity Using Online Traffic Analysis at the Edge

Abstract: IoT devices are notoriously vulnerable even to trivial attacks and can be easily compromised. In addition, resource constraints and heterogeneity of IoT devices make it impractical to secure IoT installations using traditional endpoint and network security solutions. To address this problem, we present IOT-KEEPER, a lightweight system which secures the communication of IoT. IOT-KEEPER uses our proposed anomaly detection technique to perform traffic analysis at edge gateways. It uses a combination of fuzzy C-me… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
77
0
6

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
2
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 147 publications
(83 citation statements)
references
References 31 publications
0
77
0
6
Order By: Relevance
“…The ensemble scheme obtained 99% detection accuracy. IoT-keeper proposed an anomaly detection system based on fuzzy C-means clustering and fuzzy interpolation scheme and recurrent neural network [13]. The proposed technique achieved 98% accuracy having a 0.02 false alarm rate and for evaluation purpose, it uses the Kitsune dataset.…”
Section: A Organizationmentioning
confidence: 99%
“…The ensemble scheme obtained 99% detection accuracy. IoT-keeper proposed an anomaly detection system based on fuzzy C-means clustering and fuzzy interpolation scheme and recurrent neural network [13]. The proposed technique achieved 98% accuracy having a 0.02 false alarm rate and for evaluation purpose, it uses the Kitsune dataset.…”
Section: A Organizationmentioning
confidence: 99%
“…A security system focusing on the IoT network devices was proposed by Hafeez [1] to detect the malicious activity in the IoT network devices. The authors use the IoT keeper method to detect and analysis the malicious activity in IoT devices.…”
Section: Literature Surveymentioning
confidence: 99%
“…Traffic Analysis: Traffic analysis can achieve various applications, including detecting drones [31,35], inferring apps [36,38], monitoring misbehaving apps [42], enforcing network access restrictions [14], identifying actions on apps [11], and detecting hidden wireless cameras [10]. Unlike existing traffic analysis based approaches (e.g., [10,36,38,42]), which utilize the inherent traffic patterns (side-channel information leaks) to detect devices or apps which generate them, our work correlates the traffic pattern with human activities.…”
Section: Related Workmentioning
confidence: 99%