Platform Utilizing Similar Users’ Data to Detect Anomalous Operation of Home IoT Without Sharing Private Information

To mitigate the risk of cyberattacks on home IoT devices, we have proposed a method for detecting anomalous operations by learning the behaviors of users based on the operation sequences of their home IoT devices and home conditions. While this method requires a sufficient amount of training data, a...

Full description

Bibliographic Details
Main Authors: Masaaki Yamauchi, Yuichi Ohsita, Masayuki Murata
Format: Article
Language:English
Published: IEEE 2021-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/9536748/