Survey on unified threat management (UTM) systems for home networks

A Siddiqui, BP Rimal, M Reisslein… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
Home networks increasingly support important networked applications with limited
professional network administration support, while sophisticated attacks pose enormous …

Applying self-supervised learning to network intrusion detection for network flows with graph neural network

R Xu, G Wu, W Wang, X Gao, A He, Z Zhang - Computer Networks, 2024 - Elsevier
Abstract Graph Neural Networks (GNNs) have garnered intensive attention for Network
Intrusion Detection System (NIDS) due to their suitability for representing the network traffic …

Make your home safe: Time-aware unsupervised user behavior anomaly detection in smart homes via loss-guided mask

J **ao, Z Xu, Q Zou, Q Li, D Zhao, D Fang, R Li… - Proceedings of the 30th …, 2024 - dl.acm.org
Smart homes, powered by the Internet of Things, offer great convenience but also pose
security concerns due to abnormal behaviors, such as improper operations of users and …

Emtd-ssc: An enhanced malicious traffic detection model using transfer learning under small sample conditions in iot

Y Ge, Y Gao, X Li, B Cai, J **… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
In the Internet of Things (IoT) scenario, the device diversity and data sparsity present a
significant challenge for malicious traffic detection, notably the “small sample problem” …

Seeing is believing: Extracting semantic information from video for verifying iot events

C Fu, X Du, Q Zeng, Z Zhao, F Zuo, J Di - Proceedings of the 17th ACM …, 2024 - dl.acm.org
Along with the increasing popularity of smart home IoT devices, more users are turning to
smart home automation platforms to control and automate their IoT devices. However, IoT …

Self-supervised machine learning framework for online container security attack detection

O Tunde-Onadele, Y Lin, X Gu, J He… - ACM Transactions on …, 2024 - dl.acm.org
Container security has received much research attention recently. Previous work has
proposed to apply various machine learning techniques to detect security attacks in …

Detecting Internet-of-Things Malware on Evidence Generation

YS Han, HB Seo, MK Yoon - IEEE Internet of Things Journal, 2024 - ieeexplore.ieee.org
Malware has been a real threat to Internet of Things (IoT). Although commercial antivirus
solutions can detect malware files and provide label information indicating malware types or …

Anomaly Detection in Smart IoT Systems Based on Contextual Semantics of Behavior Graphs

Q Lin, S Chang, J Mao, Q Liu, Z Liu… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
With the advancement of IoT technology, smart IoT systems have become integral to
industrial production and daily life. However, they face significant security and privacy …

Mateen: Adaptive Ensemble Learning for Network Anomaly Detection

F Alotaibi, S Maffeis - Proceedings of the 27th International Symposium …, 2024 - dl.acm.org
Anomaly-based intrusion detection systems are tasked with identifying deviations from
established benign network behaviors, assuming such deviations to be indicators of …

ProvIoT: Detecting Stealthy Attacks in IoT through Federated Edge-Cloud Security

K Mukherjee, J Wiedemeier, Q Wang… - … Conference on Applied …, 2024 - Springer
Abstract Internet of Things (IoT) devices have increased drastically in complexity and
prevalence within the last decade. Alongside the proliferation of IoT devices and …