{"id":"https://openalex.org/W4200255501","doi":"https://doi.org/10.1109/latincom53176.2021.9647769","title":"Attack Detection in Smart Home IoT Networks using CluStream and Page-Hinkley Test","display_name":"Attack Detection in Smart Home IoT Networks using CluStream and Page-Hinkley Test","publication_year":2021,"publication_date":"2021-11-17","ids":{"openalex":"https://openalex.org/W4200255501","doi":"https://doi.org/10.1109/latincom53176.2021.9647769"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/latincom53176.2021.9647769","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arts.units.it/bitstream/11368/3014629/4/3014629_Attack_Detection_in_Smart_Home_IoT_Networks_using_CluStream_and_Page-Hinkley_Test-Post_print.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5015346956","display_name":"Fernando H. Y. Nakagawa","orcid":null},"institutions":[{"id":"https://openalex.org/I127110123","display_name":"Universidade Estadual de Londrina","ror":"https://ror.org/01585b035","country_code":"BR","type":"education","lineage":["https://openalex.org/I127110123"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Fernando H. Y. Nakagawa","raw_affiliation_strings":["Dept. of Computer Science, State University of Londrina, Londrina, Brazil"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Science, State University of Londrina, Londrina, Brazil","institution_ids":["https://openalex.org/I127110123"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004953377","display_name":"Sylvio Barbon","orcid":"https://orcid.org/0000-0002-4988-0702"},"institutions":[{"id":"https://openalex.org/I127110123","display_name":"Universidade Estadual de Londrina","ror":"https://ror.org/01585b035","country_code":"BR","type":"education","lineage":["https://openalex.org/I127110123"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Sylvio Barbon Junior","raw_affiliation_strings":["Dept. of Computer Science, State University of Londrina, Londrina, Brazil"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Science, State University of Londrina, Londrina, Brazil","institution_ids":["https://openalex.org/I127110123"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5011873799","display_name":"Bruno Bogaz Zarpel\ufffd\u00e3o","orcid":"https://orcid.org/0000-0001-9172-3578"},"institutions":[{"id":"https://openalex.org/I127110123","display_name":"Universidade Estadual de Londrina","ror":"https://ror.org/01585b035","country_code":"BR","type":"education","lineage":["https://openalex.org/I127110123"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Bruno Bogaz Zarpelao","raw_affiliation_strings":["Dept. of Computer Science, State University of Londrina, Londrina, Brazil"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Science, State University of Londrina, Londrina, Brazil","institution_ids":["https://openalex.org/I127110123"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.794,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":6,"citation_normalized_percentile":{"value":0.674892,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":81,"max":83},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9995,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/home-automation","display_name":"Home Automation","score":0.4514708}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8422923},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.6311426},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5655785},{"id":"https://openalex.org/C2984118289","wikidata":"https://www.wikidata.org/wiki/Q29954","display_name":"Power consumption","level":3,"score":0.4712679},{"id":"https://openalex.org/C507571656","wikidata":"https://www.wikidata.org/wiki/Q848436","display_name":"Home automation","level":2,"score":0.4514708},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.44909722},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.44286686},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3781397},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.33126193},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.32337865},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10261685},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/latincom53176.2021.9647769","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},{"is_oa":true,"landing_page_url":"http://hdl.handle.net/11368/3014629","pdf_url":"https://arts.units.it/bitstream/11368/3014629/4/3014629_Attack_Detection_in_Smart_Home_IoT_Networks_using_CluStream_and_Page-Hinkley_Test-Post_print.pdf","source":{"id":"https://openalex.org/S4306400480","display_name":"ArTS Archivio della ricerca di Trieste (University of Trieste https://www.units.it/)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/I142444530","host_organization_name":"University of Trieste","host_organization_lineage":["https://openalex.org/I142444530"],"host_organization_lineage_names":["University of Trieste"],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false}],"best_oa_location":{"is_oa":true,"landing_page_url":"http://hdl.handle.net/11368/3014629","pdf_url":"https://arts.units.it/bitstream/11368/3014629/4/3014629_Attack_Detection_in_Smart_Home_IoT_Networks_using_CluStream_and_Page-Hinkley_Test-Post_print.pdf","source":{"id":"https://openalex.org/S4306400480","display_name":"ArTS Archivio della ricerca di Trieste (University of Trieste https://www.units.it/)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/I142444530","host_organization_name":"University of Trieste","host_organization_lineage":["https://openalex.org/I142444530"],"host_organization_lineage_names":["University of Trieste"],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false},"sustainable_development_goals":[{"display_name":"Affordable and clean energy","score":0.91,"id":"https://metadata.un.org/sdg/7"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":14,"referenced_works":["https://openalex.org/W1537430301","https://openalex.org/W2170936641","https://openalex.org/W2602930697","https://openalex.org/W2769764694","https://openalex.org/W2892556724","https://openalex.org/W2895633135","https://openalex.org/W2896396724","https://openalex.org/W2955014922","https://openalex.org/W2963582967","https://openalex.org/W3047562633","https://openalex.org/W3109376429","https://openalex.org/W3111828510","https://openalex.org/W3122864121","https://openalex.org/W4249116379"],"related_works":["https://openalex.org/W4311097251","https://openalex.org/W4245926026","https://openalex.org/W4200598720","https://openalex.org/W3161928361","https://openalex.org/W3111735654","https://openalex.org/W2950174689","https://openalex.org/W2625093826","https://openalex.org/W2586548817","https://openalex.org/W2377019487","https://openalex.org/W2130053764"],"abstract_inverted_index":{"The":[0],"expansion":[1],"of":[2,116,150,162],"IoT":[3,107],"device":[4],"networks":[5],"increases":[6],"the":[7,84,114,156,174],"demand":[8,56],"for":[9],"security":[10],"systems":[11],"that":[12],"detect":[13,102],"attacks":[14,103,163],"against":[15],"these":[16],"new":[17],"targets.":[18],"These":[19,54],"devices":[20,154],"have":[21,34,42],"simple":[22],"hardware,":[23],"limited":[24],"memory":[25],"and":[26,29,58,98,120,132,155],"processing":[27],"power,":[28],"often":[30],"are":[31,77,158],"required":[32],"to":[33,45,62,69,82,101,129],"low":[35],"energy":[36],"consumption.":[37],"Batch":[38],"supervised":[39],"learning":[40,85],"algorithms":[41,55],"been":[43],"employed":[44],"address":[46],"this":[47,92],"issue,":[48],"but":[49],"they":[50,76],"present":[51],"some":[52],"limitations.":[53],"benign":[57],"malicious":[59],"labeled":[60,127],"samples":[61,128],"be":[63,67,130],"trained,":[64,78],"which":[65],"can":[66],"hard":[68,81],"obtain":[70],"in":[71,104],"real":[72],"networks.":[73,108],"Also,":[74],"once":[75],"it":[79,136],"is":[80,111,137],"update":[83],"model":[86],"with":[87,166],"newly":[88],"found":[89],"behaviors.":[90],"In":[91],"work,":[93],"we":[94],"propose":[95],"an":[96,167],"online":[97],"unsupervised":[99],"scheme":[100,110],"smart":[105,152],"home":[106,153],"This":[109],"based":[112],"on":[113],"combination":[115],"two":[117],"algorithms:":[118],"CluStream":[119],"Page-Hinkley":[121],"Test.":[122],"It":[123],"does":[124],"not":[125],"require":[126],"trained":[131],"learns":[133],"incrementally":[134],"as":[135],"used.":[138],"Tests":[139],"were":[140,164],"performed":[141],"over":[142],"data":[143],"obtained":[144],"from":[145],"publicly":[146],"available":[147],"datasets":[148],"consisting":[149],"multiple":[151],"results":[157],"encouraging.":[159],"Different":[160],"types":[161],"detected":[165],"overall":[168],"detection":[169],"rate":[170],"around":[171],"97%,":[172],"while":[173],"precision":[175],"stayed":[176],"above":[177],"87%.":[178]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4200255501","counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":2}],"updated_date":"2025-01-18T03:14:55.150986","created_date":"2021-12-31"}