Cybersecurity Threat Detection in the Behavior of IoT Devices: Analysis of Data Mining Competition Results

0Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.

Abstract

The paper discusses a data science competition centered around the development of an anomaly detection system for IoT devices. The competition utilized a unique environment that allowed for the operation and monitoring of real IoT devices, including scheduling of attacks on these devices. The environment was used to collect the data, which included both normal and attack-induced behavior of IoT devices. The paper presents the background of the competition, the top models submitted, and the competition results. The paper also includes a discussion about restrictions related to the use of synthetic attack data as input for constructing anomaly detection systems.

Cite

CITATION STYLE

APA

Czerwinski, M., Michalak, M., Biczyk, P., Adamczyk, B., Iwanicki, D., Kostorz, I., … Kozlowski, A. (2023). Cybersecurity Threat Detection in the Behavior of IoT Devices: Analysis of Data Mining Competition Results. In Proceedings of the 18th Conference on Computer Science and Intelligence Systems, FedCSIS 2023 (pp. 1289–1293). Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.15439/2023F3089

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free