Please use this identifier to cite or link to this item:
http://hdl.handle.net/11452/33045
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Gajewski, Mariusz | - |
dc.contributor.author | Batalla, Jordi Mongay | - |
dc.contributor.author | Levi, Albert | - |
dc.contributor.author | Mavromoustakis, Constandinos X. | - |
dc.contributor.author | Mastorakis, George | - |
dc.date.accessioned | 2023-06-15T10:30:32Z | - |
dc.date.available | 2023-06-15T10:30:32Z | - |
dc.date.issued | 2019-07-20 | - |
dc.identifier.citation | Gajewski, M. vd. (2019). ''Two-tier anomaly detection based on traffic profiling of the home automation system''. Computer Networks, 158, 46-60. | en_US |
dc.identifier.issn | 1389-1286 | - |
dc.identifier.issn | 1872-7069 | - |
dc.identifier.uri | https://doi.org/10.1016/j.comnet.2019.04.013 | - |
dc.identifier.uri | https://www.sciencedirect.com/science/article/pii/S1389128618311587 | - |
dc.identifier.uri | http://hdl.handle.net/11452/33045 | - |
dc.description.abstract | Smart building equipment and automation systems often become a target of attacks and are used for attacking other targets located out of the Home Area Network. Attacks are often related to changes in traffic volume, disturbed packet flow or excessive energy consumption. Their symptoms can be recognized and interpreted locally, using software agent at Home Gateway. Although anomalies are detected locally at the Home Gateway, they can be exploited globally. Thus, it is significantly important to detect global attack attempts through anomalies correlation. Our proposal in this paper is the involvement of the Network Operator in Home Area Network security. Our paper describes a novel strategy for anomaly detection that consists of shared responsibilities between user and network provider. The proposed two-tier Intrusion Detection System uses a machine learning method for classifying the monitoring records and searching suspicious anomalies across the network at the service provider's data center. Result show that local anomaly detection combined with anomaly correlation at the service providers level can provide reliable information on the most frequent IoT devices misbehavior which may be caused by infection. | en_US |
dc.description.sponsorship | National Centre for Research and Development (NCBiR) in Poland | en_US |
dc.language.iso | en | en_US |
dc.publisher | Elsevier | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.subject | Computer science | en_US |
dc.subject | Engineering | en_US |
dc.subject | Telecommunications | en_US |
dc.subject | Home gateway | en_US |
dc.subject | Wireless sensor networks | en_US |
dc.subject | Smart home | en_US |
dc.subject | Anomaly detection | en_US |
dc.subject | Internet of things | en_US |
dc.subject | Intrusion-detection | en_US |
dc.subject | Internet | en_US |
dc.subject | Automation | en_US |
dc.subject | Computer crime | en_US |
dc.subject | Energy utilization | en_US |
dc.subject | Enterprise resource planning | en_US |
dc.subject | Gateways (computer networks) | en_US |
dc.subject | Home networks | en_US |
dc.subject | Internet of things | en_US |
dc.subject | Internet service providers | en_US |
dc.subject | Intrusion detection | en_US |
dc.subject | Learning systems | en_US |
dc.subject | Network security | en_US |
dc.subject | Search engines | en_US |
dc.subject | Software agents | en_US |
dc.subject | Wireless sensor networks | en_US |
dc.subject | Anomaly correlations | en_US |
dc.subject | Building equipments | en_US |
dc.subject | Home automation systems | en_US |
dc.subject | Home gateway | en_US |
dc.subject | Intrusion detection systems | en_US |
dc.subject | Machine learning methods | en_US |
dc.subject | Shared responsibility | en_US |
dc.subject | Smart homes | en_US |
dc.subject | Anomaly detection | en_US |
dc.title | Two-tier anomaly detection based on traffic profiling of the home automation system | en_US |
dc.type | Article | en_US |
dc.identifier.wos | 000472243200004 | tr_TR |
dc.identifier.scopus | 2-s2.0-85065068872 | tr_TR |
dc.relation.tubitak | 117E017 | tr_TR |
dc.relation.publicationcategory | Makale - Uluslararası Hakemli Dergi | tr_TR |
dc.contributor.department | Bursa Uludağ Üniversitesi/Mühendislik Fakültesi/Bilgisayar Mühendisliği/Siber Güvenlik Bölümü. | tr_TR |
dc.contributor.orcid | 0000-0001-5739-1784 | tr_TR |
dc.identifier.startpage | 46 | tr_TR |
dc.identifier.endpage | 60 | tr_TR |
dc.identifier.volume | 158 | tr_TR |
dc.relation.journal | Computer Networks | en_US |
dc.contributor.buuauthor | Togay, Cengiz | - |
dc.contributor.researcherid | AAG-9038-2020 | tr_TR |
dc.relation.collaboration | Yurt dışı | tr_TR |
dc.relation.collaboration | Sanayi | tr_TR |
dc.subject.wos | Computer science, hardware & architecture | en_US |
dc.subject.wos | Computer science, information systems | en_US |
dc.subject.wos | Engineering, electrical & electronic | en_US |
dc.subject.wos | Telecommunications | en_US |
dc.indexed.wos | SCIE | en_US |
dc.indexed.scopus | Scopus | en_US |
dc.wos.quartile | Q4 | en_US |
dc.contributor.scopusid | 15065979500 | tr_TR |
dc.subject.scopus | Denial-Of-Service Attack; DDoS; Attack | en_US |
Appears in Collections: | Scopus Web of Science |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.