Telecommunication service providers (telcos) are exposed to cyber-attacks executed by compromised IoT devices connected to their customers’ networks. Such attacks might have severe effects on the attack target, as well as the telcos themselves. To mitigate those risks, we propose a machine learning-based method that can detect specific vulnerable IoT device models connected behind a domestic NAT, thereby identifying home networks that pose a risk to the telcos infrastructure and service availability. To evaluate our method, we collected a large quantity of network traffic data from various commercial IoT devices in our lab and compared several classification algorithms. We found that (a) the LGBM algorithm produces excellent detection resul...
For networks with limited resources, such as IoT-enabled smart homes, smart industrial equipment, an...
In recent years, the Internet of Things (IoT) has grown up rapidly and tremendously. This growth has...
The usage of Internet of Things (IoT) devices has been exponentially increasing and their security i...
Lack of network security is a major roadblock for Internet of Things (IoT) implementations. New atta...
The concept of Internet of Things has materialize the vision of a society where users, computing sys...
With the emerging trend of smart IoT devices, providing and ensuring the privacy of the users'-devic...
This dataset is comprised of NetFlow records, which capture the outbound network traffic of 8 commer...
The IoT (Internet of Things) technology has been widely adopted in recent years and has profoundly c...
The Smart Home (SH) has become an appealing target of cyberattacks. Due to the limitation of hardwar...
The growing use of IoT devices in organizations has increased the number of attack vectors available...
Although desktops and laptops have historically composed the bulk of botnet nodes, Internet of Thing...
In recent years, Internet of Things (IoT) traffic has increased dramatically and is expected to grow...
The Internet of Things (IoT) is being hailed as the next wave revolutionizing our society, and smart...
One of the important features of routing protocol for low-power and lossy networks (RPLs) is objecti...
The pervasive and resource-constrained nature of Internet of Things (IoT) devices makes them attract...
For networks with limited resources, such as IoT-enabled smart homes, smart industrial equipment, an...
In recent years, the Internet of Things (IoT) has grown up rapidly and tremendously. This growth has...
The usage of Internet of Things (IoT) devices has been exponentially increasing and their security i...
Lack of network security is a major roadblock for Internet of Things (IoT) implementations. New atta...
The concept of Internet of Things has materialize the vision of a society where users, computing sys...
With the emerging trend of smart IoT devices, providing and ensuring the privacy of the users'-devic...
This dataset is comprised of NetFlow records, which capture the outbound network traffic of 8 commer...
The IoT (Internet of Things) technology has been widely adopted in recent years and has profoundly c...
The Smart Home (SH) has become an appealing target of cyberattacks. Due to the limitation of hardwar...
The growing use of IoT devices in organizations has increased the number of attack vectors available...
Although desktops and laptops have historically composed the bulk of botnet nodes, Internet of Thing...
In recent years, Internet of Things (IoT) traffic has increased dramatically and is expected to grow...
The Internet of Things (IoT) is being hailed as the next wave revolutionizing our society, and smart...
One of the important features of routing protocol for low-power and lossy networks (RPLs) is objecti...
The pervasive and resource-constrained nature of Internet of Things (IoT) devices makes them attract...
For networks with limited resources, such as IoT-enabled smart homes, smart industrial equipment, an...
In recent years, the Internet of Things (IoT) has grown up rapidly and tremendously. This growth has...
The usage of Internet of Things (IoT) devices has been exponentially increasing and their security i...