Search Results for author: Yair Meidan

Found 4 papers, 1 papers with code

CADeSH: Collaborative Anomaly Detection for Smart Homes

no code implementations2 Mar 2023 Yair Meidan, Dan Avraham, Hanan Libhaber, Asaf Shabtai

To overcome this, we propose a two-step collaborative anomaly detection method which first uses an autoencoder to differentiate frequent (`benign') and infrequent (possibly `malicious') traffic flows.

Anomaly Detection Intrusion Detection +1

Privacy-Preserving Detection of IoT Devices Connected Behind a NAT in a Smart Home Setup

no code implementations31 May 2019 Yair Meidan, Vinay Sachidananda, Yuval Elovici, Asaf Shabtai

Today, telecommunication service providers (telcos) are exposed to cyber-attacks executed by compromised IoT devices connected to their customers' networks.

Privacy Preserving

N-BaIoT: Network-based Detection of IoT Botnet Attacks Using Deep Autoencoders

2 code implementations9 May 2018 Yair Meidan, Michael Bohadana, Yael Mathov, Yisroel Mirsky, Dominik Breitenbacher, Asaf Shabtai, Yuval Elovici

The proliferation of IoT devices which can be more easily compromised than desktop computers has led to an increase in the occurrence of IoT based botnet attacks.

Anomaly Detection

Detection of Unauthorized IoT Devices Using Machine Learning Techniques

no code implementations14 Sep 2017 Yair Meidan, Michael Bohadana, Asaf Shabtai, Martin Ochoa, Nils Ole Tippenhauer, Juan Davis Guarnizo, Yuval Elovici

Based on the classification of 20 consecutive sessions and the use of majority rule, IoT device types that are not on the white list were correctly detected as unknown in 96% of test cases (on average), and white listed device types were correctly classified by their actual types in 99% of cases.

BIG-bench Machine Learning General Classification

Cannot find the paper you are looking for? You can Submit a new open access paper.