Tech »  Topic »  How CUMAD Accumulates Evidence to Unmask Compromised IoT Devices

How CUMAD Accumulates Evidence to Unmask Compromised IoT Devices


by hypothesis... July 1st, 2025

CUMAD detects compromised IoT devices by accumulating evidence with an autoencoder and SPRT, slashing false alerts and enabling rapid, reliable detection.

Table of Links

Abstract and 1. Introduction

2. Related Work

3. Background on Autoencoder and SPRT and 3.1. Autoencoder

3.2. Sequential Probability Ratio Test

4. Design of CUMAD and 4.1. Network Model

4.2. CUMAD: Cumulative Anomaly Detection

5. Evaluation Studies and 5.1. Dataset, Features, and CUMAD System Setup

5.2. Performance Results

6. Conclusions and References

Abstract—IoT devices fundamentally lack built-in security mechanisms to protect themselves from security attacks. Existing works on improving IoT security mostly focus on detecting anomalous behaviors of IoT devices. However, these existing anomaly detection schemes may trigger an overwhelmingly large number of false alerts, rendering them unusable in detecting compromised IoT devices. In this paper we develop an effective and efficient framework, named ...


Copyright of this story solely belongs to hackernoon.com . To see the full text click HERE