How CUMAD Accumulates Evidence to Unmask Compromised IoT Devices
hackernoon.comCUMAD detects compromised IoT devices by accumulating evidence with an autoencoder and SPRT, slashing false alerts and enabling rapid, reliable detection.


Table of Links
3. Background on Autoencoder and SPRT and 3.1. Autoencoder
3.2. Sequential Probability Ratio Test
4. Design of CUMAD and 4.1. Network Model
4.2. CUMAD: Cumulative Anomaly Detection
5. Evaluation Studies and 5.1. Dataset, Features, and CUMAD System Setup
Abstract—IoT devices fundamentally lack built-in security mechanisms to protect themselves from security attacks. Existing works on improving IoT security mostly focus on detecting anomalous behaviors of IoT devices. However, these existing anomaly detection schemes may trigger an overwhelmingly large number of false alerts, rendering them unusable in detecting compromised IoT devices. In this paper we develop an effective and efficient framework, named ...
Copyright of this story solely belongs to hackernoon.com . To see the full text click HERE