{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T19:22:31Z","timestamp":1774466551714,"version":"3.50.1"},"reference-count":42,"publisher":"Wiley","issue":"6","license":[{"start":{"date-parts":[[2020,7,31]],"date-time":"2020-07-31T00:00:00Z","timestamp":1596153600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"funder":[{"DOI":"10.13039\/501100005632","name":"Narodowe Centrum Bada\u0144 i Rozwoju","doi-asserted-by":"publisher","award":["Poltur II FUSE"],"award-info":[{"award-number":["Poltur II FUSE"]}],"id":[{"id":"10.13039\/501100005632","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Trans Emerging Tel Tech"],"published-print":{"date-parts":[[2022,6]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Smart building automation systems are increasingly the target of hacking attacks. Moreover, they may be used as a tool for attacks against targets located out of the native Home Area Network (HAN). These attacks are often resulted in changes in traffic volume, damaged packets, increased message traffic, and so on. Symptoms of attacks can be detected as anomalies in traffic model and recognized by a software agent run on Home Gateway. Although these anomalies are detected locally, it may help network provider to protect his resources as well as other resources of his clients. For that purpose, network operator should be able to recognize anomalies and correlate them on the network level. In this way, the network operator has the ability to protect both its own network and HANs of its clients. This article shows that Smart Home security might be coupled with the providers' network security policy. For that reason, security tasks should be performed both in HAN and providers' data center. This article describes a novel strategy for anomaly detection that provides shared responsibility between a service client and the network provider. It uses a machine learning approach for classifying the monitoring data and correlation in searching suspicious behavior across the network resources at the service provider's data center.<\/jats:p>","DOI":"10.1002\/ett.4053","type":"journal-article","created":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T04:35:47Z","timestamp":1596256547000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["Anomaly traffic detection and correlation in Smart Home automation <scp>IoT<\/scp> systems"],"prefix":"10.1002","volume":"33","author":[{"given":"Mariusz","family":"Gajewski","sequence":"first","affiliation":[{"name":"Internet Technologies and Applications Department Institute of Telecommunications  Warsaw Poland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1489-5138","authenticated-orcid":false,"given":"Jordi","family":"Mongay Batalla","sequence":"additional","affiliation":[{"name":"Institute of Telecommunications Warsaw University of Technology  Warsaw Poland"}]},{"given":"George","family":"Mastorakis","sequence":"additional","affiliation":[{"name":"Department of Management Science and Technology Hellenic Mediterranean University  Crete Greece"}]},{"given":"Constandinos X.","family":"Mavromoustakis","sequence":"additional","affiliation":[{"name":"Department of Computer Science University of Nicosia  Nicosia Cyprus"}]}],"member":"311","published-online":{"date-parts":[[2020,7,31]]},"reference":[{"key":"e_1_2_8_2_1","unstructured":"AntonakakisM AprilT BaileyM et al. Understanding the Mirai Botnet. Paper presented at: Proceedings of the 26th USENIX Security Symposium;2017."},{"key":"e_1_2_8_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-2622-6_34"},{"key":"e_1_2_8_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-4590-4"},{"key":"e_1_2_8_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-016-1844-2"},{"key":"e_1_2_8_6_1","doi-asserted-by":"publisher","DOI":"10.1080\/23270012.2016.1259967"},{"key":"e_1_2_8_7_1","doi-asserted-by":"publisher","DOI":"10.1142\/S2424862219500192"},{"key":"e_1_2_8_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.09.003"},{"key":"e_1_2_8_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-50758-3_13"},{"key":"e_1_2_8_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2016.7721736"},{"key":"e_1_2_8_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2018.08.006"},{"key":"e_1_2_8_12_1","doi-asserted-by":"crossref","unstructured":"RathoreMM PaulA AhmadA RhoS ImranM GuizaniM. Hadoop based real\u2010time intrusion detection for high\u2010speed networks. Paper presented at: Proceedings of the 2016 IEEE Global Communications Conference (Globecom); December 4\u20108 2016:1\u20136; Washington DC.","DOI":"10.1109\/GLOCOM.2016.7841864"},{"key":"e_1_2_8_13_1","unstructured":"HaddadiH ChristophidesV TeixeiraR ChoK SuzukiSA. Perrig SIOTOME: an edge\u2010isp collaborative architecture for iot security. Paper presented at: Proceedings of 1st International Workshop on Security and Privacy for the Internet\u2010Of\u2010Things (IoTSec);2018."},{"key":"e_1_2_8_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-4854-z"},{"key":"e_1_2_8_15_1","doi-asserted-by":"crossref","unstructured":"MidiD RulloA MudgerikarA BertinoE. Kalis \u2010 a system for knowledge\u2010driven adaptable intrusion detection for the Internet of Things. Paper presented at: Proceedings of the IEEE 37th International Conference on Distributed Computing Systems (ICDCS); June2017:656\u2010666; Atlanta GA.","DOI":"10.1109\/ICDCS.2017.104"},{"key":"e_1_2_8_16_1","unstructured":"\u201cOpenWRTA Linux OS for embedded devices.https:\/\/openwrt.org\/."},{"key":"e_1_2_8_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2013.04.014"},{"key":"e_1_2_8_18_1","doi-asserted-by":"crossref","unstructured":"ShreenivasD RazaS VoigtT. Intrusion detection in the RPL\u2010connected 6LoWPAN networks. Paper presented at: Proceedings of the 3rd ACM Int. Workshop IoT Privacy Trust Security;2017:31\u201038","DOI":"10.1145\/3055245.3055252"},{"key":"e_1_2_8_19_1","unstructured":"IoulianouPP VassilakisV MoscholiosID LogothetisMD. A signature\u2010based intrusion detection system for the internet of things. Paper presented at: Proceedings of the IEICE Information and Communication Technology Form (ICTF);2018"},{"key":"e_1_2_8_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2926365"},{"key":"e_1_2_8_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.04.039"},{"key":"e_1_2_8_22_1","doi-asserted-by":"crossref","unstructured":"ShuklaP. ML\u2010IDS: a machine learning approach to detect wormhole attacks in Internet of Things. Paper presented at: Proceedings of the IEEE Intelligent Systems Conference (IntelliSys);2017:234\u2010240","DOI":"10.1109\/IntelliSys.2017.8324298"},{"key":"e_1_2_8_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jii.2017.02.003"},{"key":"e_1_2_8_24_1","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3635"},{"key":"e_1_2_8_25_1","doi-asserted-by":"crossref","unstructured":"AmouriA AlaparthyVT MorgeraSD. Cross layer\u2010based intrusion detection based on network behavior for IoT. Paper presented at: Proceedings of the IEEE 19th Wireless Microw Technol Conference (WAMICON);2018:1\u20104.","DOI":"10.1109\/WAMICON.2018.8363921"},{"key":"e_1_2_8_26_1","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3743"},{"key":"e_1_2_8_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2018.03367731"},{"key":"e_1_2_8_28_1","doi-asserted-by":"crossref","unstructured":"DoshiR ApthorpeN FeamsterN. Machine learning DDoS detection for consumer internet of things devices. Paper presented at: Proceedings IEEE Security Privacy Workshops (SPW); 2018:29\u201035.","DOI":"10.1109\/SPW.2018.00013"},{"key":"e_1_2_8_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2014.2300753"},{"key":"e_1_2_8_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7045410"},{"key":"e_1_2_8_31_1","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3647"},{"key":"e_1_2_8_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1987.232894"},{"key":"e_1_2_8_33_1","doi-asserted-by":"publisher","DOI":"10.1080\/23270012.2016.1214540"},{"key":"e_1_2_8_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jii.2018.01.005"},{"key":"e_1_2_8_35_1","unstructured":"WangK StolfoSJ. One class training for masquerade detection. Paper presented at: Proceedings of the ICDM Workshop on Data Mining for Computer Security;2003."},{"key":"e_1_2_8_36_1","doi-asserted-by":"crossref","unstructured":"DuchW JankowskiN MaszczykT. Make it cheap: learning with O(nd) complexity. Paper presented at: Proceedings of the 2012 International Joint Conference on Neural Networks (IJCNN);2012:1\u20104; Brisbane QLD.","DOI":"10.1109\/IJCNN.2012.6252380"},{"issue":"2005","key":"e_1_2_8_37_1","first-page":"363","article-title":"Core vector machines: fast SVM training on very large data sets","volume":"6","author":"Tsang IW","year":"2005","journal-title":"J Mach Learn Res"},{"key":"e_1_2_8_38_1","unstructured":"DattaP. Characteristic Concept Representations (PhD thesis). University of California Irvine;1997."},{"key":"e_1_2_8_39_1","unstructured":"EsterM KriegelHP SanderJ XuX. A density\u2010based algorithm for discovering clusters in large spatial databases with noise. Paper presented at: Proceedings of the Second International Conference on Knowledge Discovery and Data Mining (KDD\u201096);1996:226\u2010231; AAAI Press CiteSeerX."},{"key":"e_1_2_8_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2016.02.020"},{"key":"e_1_2_8_41_1","doi-asserted-by":"crossref","unstructured":"KryftisY MavromoustakisCX MastorakisG et al. Resource usage prediction algorithms for optimal selection of multimedia content delivery methods. Paper presented at: Proceedings of the 2015 IEEE International Conference on Communications (ICC);2015:5903\u20105909; London UK.","DOI":"10.1109\/ICC.2015.7249263"},{"key":"e_1_2_8_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"issue":"1","key":"e_1_2_8_43_1","first-page":"3","article-title":"Traversing knowledge networks: an algorithmic historiography of extant literature on the Internet of Things","volume":"4","author":"Liu F","year":"2017","journal-title":"J Manag Anal"}],"container-title":["Transactions on Emerging Telecommunications Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fett.4053","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/ett.4053","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1002\/ett.4053","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/ett.4053","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,24]],"date-time":"2023-08-24T09:24:58Z","timestamp":1692869098000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/ett.4053"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,31]]},"references-count":42,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2022,6]]}},"alternative-id":["10.1002\/ett.4053"],"URL":"https:\/\/doi.org\/10.1002\/ett.4053","archive":["Portico"],"relation":{},"ISSN":["2161-3915","2161-3915"],"issn-type":[{"value":"2161-3915","type":"print"},{"value":"2161-3915","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,7,31]]},"assertion":[{"value":"2019-12-06","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-06-02","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-07-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"e4053"}}