This work explores the evaluation of a machine learning anomaly detector using custom-made parameterizable malware in an Internet of Things (IoT) Ecosystem. It is assumed that the malware has infected, and resides on, the Linux router that serves other devices on the network, as depicted in Figure 1. This IoT Ecosystem was developed as a testbed to evaluate the efficacy of a behavior-based anomaly detector. The malware consists of three types of custom-made malware: ransomware, cryptominer, and keylogger, which all have exfiltration capabilities to the network. The parameterization of the malware gives the malware samples multiple degrees of freedom, specifically relating to the rate and size of data exfiltration. The anomaly detector uses ...
Internet of things (IoT) devices communicate, collect and exchange data about our online activities ...
While the IoT offers important benefits and opportunities for users, the technology raises various s...
IoT comprises sensors and other small devices interconnected locally and via the Internet. Typical I...
Anomaly detection is an imperative problem in the field of the Internet of Things (IoT). The anomali...
The Internet of Things (IoT) consists of a massive number of smart devices capable of data collectio...
Internet of Things(IoT) malware established itself as the new type of threat after enabling the most...
Ongoing research on anomaly detection for the Internet of Things (IoT) is a rapidly expanding field....
Embedded devices are increasingly connected to the Internet to provide new and innovative applicatio...
Malware plays a major role as a threat to the security of computer systems. As the Internet of thing...
A botnet is an army of zombified computers infected with malware and controlled by malicious actors ...
Internet of Things devices are highly susceptible to attack, and owners often fail to realize they h...
Introduction: Internet of Things (IoT) devices have revolutionized homes, offices, and cities, where...
Over the past few years, we have witnessed the emergence of Internet of Things (IoT) networks that b...
The rapid development in ubiquitous computing has enabled the use of microcontrollers as edge device...
The Internet of Things is an open and comprehensive global network of intelligent objects that have ...
Internet of things (IoT) devices communicate, collect and exchange data about our online activities ...
While the IoT offers important benefits and opportunities for users, the technology raises various s...
IoT comprises sensors and other small devices interconnected locally and via the Internet. Typical I...
Anomaly detection is an imperative problem in the field of the Internet of Things (IoT). The anomali...
The Internet of Things (IoT) consists of a massive number of smart devices capable of data collectio...
Internet of Things(IoT) malware established itself as the new type of threat after enabling the most...
Ongoing research on anomaly detection for the Internet of Things (IoT) is a rapidly expanding field....
Embedded devices are increasingly connected to the Internet to provide new and innovative applicatio...
Malware plays a major role as a threat to the security of computer systems. As the Internet of thing...
A botnet is an army of zombified computers infected with malware and controlled by malicious actors ...
Internet of Things devices are highly susceptible to attack, and owners often fail to realize they h...
Introduction: Internet of Things (IoT) devices have revolutionized homes, offices, and cities, where...
Over the past few years, we have witnessed the emergence of Internet of Things (IoT) networks that b...
The rapid development in ubiquitous computing has enabled the use of microcontrollers as edge device...
The Internet of Things is an open and comprehensive global network of intelligent objects that have ...
Internet of things (IoT) devices communicate, collect and exchange data about our online activities ...
While the IoT offers important benefits and opportunities for users, the technology raises various s...
IoT comprises sensors and other small devices interconnected locally and via the Internet. Typical I...