Social Media Monitoring for IoT Cyber-Threats
- URL: http://arxiv.org/abs/2109.04306v1
- Date: Thu, 9 Sep 2021 14:32:24 GMT
- Title: Social Media Monitoring for IoT Cyber-Threats
- Authors: Sofia Alevizopoulou, Paris Koloveas, Christos Tryfonopoulos, Paraskevi
Raftopoulou
- Abstract summary: We focus on social media monitoring and investigate real-time Cyber-Threat Intelligence detection from the Twitter stream.
We propose a novel social media monitoring system tailored to the IoT domain.
- Score: 0.3249853429482705
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: The rapid development of IoT applications and their use in various fields of
everyday life has resulted in an escalated number of different possible
cyber-threats, and has consequently raised the need of securing IoT devices.
Collecting Cyber-Threat Intelligence (e.g., zero-day vulnerabilities or
trending exploits) from various online sources and utilizing it to proactively
secure IoT systems or prepare mitigation scenarios has proven to be a promising
direction. In this work, we focus on social media monitoring and investigate
real-time Cyber-Threat Intelligence detection from the Twitter stream.
Initially, we compare and extensively evaluate six different machine-learning
based classification alternatives trained with vulnerability descriptions and
tested with real-world data from the Twitter stream to identify the
best-fitting solution. Subsequently, based on our findings, we propose a novel
social media monitoring system tailored to the IoT domain; the system allows
users to identify recent/trending vulnerabilities and exploits on IoT devices.
Finally, to aid research on the field and support the reproducibility of our
results we publicly release all annotated datasets created during this process.
Related papers
- Machine Learning-Assisted Intrusion Detection for Enhancing Internet of Things Security [1.2369895513397127]
Attacks against the Internet of Things (IoT) are rising as devices, applications, and interactions become more networked and integrated.
To efficiently secure IoT devices, real-time detection of intrusion systems is critical.
This paper investigates the latest research on machine learning-based intrusion detection strategies for IoT security.
arXiv Detail & Related papers (2024-10-01T19:24:34Z) - Effective Intrusion Detection in Heterogeneous Internet-of-Things Networks via Ensemble Knowledge Distillation-based Federated Learning [52.6706505729803]
We introduce Federated Learning (FL) to collaboratively train a decentralized shared model of Intrusion Detection Systems (IDS)
FLEKD enables a more flexible aggregation method than conventional model fusion techniques.
Experiment results show that the proposed approach outperforms local training and traditional FL in terms of both speed and performance.
arXiv Detail & Related papers (2024-01-22T14:16:37Z) - Classification of cyber attacks on IoT and ubiquitous computing devices [49.1574468325115]
This paper provides a classification of IoT malware.
Major targets and used exploits for attacks are identified and referred to the specific malware.
The majority of current IoT attacks continue to be of comparably low effort and level of sophistication and could be mitigated by existing technical measures.
arXiv Detail & Related papers (2023-12-01T16:10:43Z) - From Generative AI to Generative Internet of Things: Fundamentals,
Framework, and Outlooks [82.964958051535]
Generative Artificial Intelligence (GAI) possesses the capabilities of generating realistic data and facilitating advanced decision-making.
By integrating GAI into modern Internet of Things (IoT), Generative Internet of Things (GIoT) is emerging and holds immense potential to revolutionize various aspects of society.
arXiv Detail & Related papers (2023-10-27T02:58:11Z) - IoTScent: Enhancing Forensic Capabilities in Internet of Things Gateways [45.44831696628473]
This paper presents IoTScent, an open-source forensic tool that enables IoT gateways and Home Automation platforms to perform IoT traffic capture and analysis.
IoTScent is specifically designed to operate over IEEE5.4-based traffic, which is the basis for many IoT-specific protocols such as Zigbee, 6LoWPAN and Thread.
This work provides a comprehensive description of the IoTScent tool, including a practical use case that demonstrates the use of the tool to perform device identification from Zigbee traffic.
arXiv Detail & Related papers (2023-10-05T09:10:05Z) - Navigating the IoT landscape: Unraveling forensics, security issues, applications, research challenges, and future [6.422895251217666]
This paper reviews forensic and security issues associated with IoT in different fields.
Most IoT devices are vulnerable to attacks due to a lack of standardized security measures.
To fulfil the security-conscious needs of consumers, IoT can be used to develop a smart home system.
arXiv Detail & Related papers (2023-09-06T04:41:48Z) - The Internet of Senses: Building on Semantic Communications and Edge
Intelligence [67.75406096878321]
The Internet of Senses (IoS) holds the promise of flawless telepresence-style communication for all human receptors'
We elaborate on how the emerging semantic communications and Artificial Intelligence (AI)/Machine Learning (ML) paradigms may satisfy the requirements of IoS use cases.
arXiv Detail & Related papers (2022-12-21T03:37:38Z) - Pervasive AI for IoT Applications: Resource-efficient Distributed
Artificial Intelligence [45.076180487387575]
Artificial intelligence (AI) has witnessed a substantial breakthrough in a variety of Internet of Things (IoT) applications and services.
This is driven by the easier access to sensory data and the enormous scale of pervasive/ubiquitous devices that generate zettabytes (ZB) of real-time data streams.
The confluence of pervasive computing and artificial intelligence, Pervasive AI, expanded the role of ubiquitous IoT systems.
arXiv Detail & Related papers (2021-05-04T23:42:06Z) - Reinforcement Learning for IoT Security: A Comprehensive Survey [4.0059435854780965]
Security has been a long run challenge in the IoT systems which has many attack vectors, security flaws and vulnerabilities.
In this paper, we present a comprehensive survey of different types of cyber-attacks against different IoT systems.
We then present reinforcement learning and deep reinforcement learning based security solutions to combat those different types of attacks in different IoT systems.
arXiv Detail & Related papers (2021-02-14T21:09:49Z) - IoT Behavioral Monitoring via Network Traffic Analysis [0.45687771576879593]
This thesis is the culmination of our efforts to develop techniques to profile the network behavioral pattern of IoTs.
We develop a robust machine learning-based inference engine trained with attributes from traffic patterns.
We demonstrate real-time classification of 28 IoT devices with over 99% accuracy.
arXiv Detail & Related papers (2020-01-28T23:13:12Z) - Blockchain-based Smart-IoT Trust Zone Measurement Architecture [1.5749416770494706]
Internet of Things (IoT) has gained a tremendous attention and become a central aspect of our environment.
In this paper, we propose a behavior monitor in IoT- setup which can provide trust-confidence to outside networks.
In addition, we also incorporate Trusted Execution Technology (Intel SGX) in order to provide a secure execution environment for applications and data on blockchain.
arXiv Detail & Related papers (2020-01-08T03:41:27Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.