CIoTA: Collaborative IoT Anomaly Detection via Blockchain

@article{Golomb2018CIoTACI,
  title={CIoTA: Collaborative IoT Anomaly Detection via Blockchain},
  author={Tomer Golomb and Yisroel Mirsky and Y. Elovici},
  journal={ArXiv},
  year={2018},
  volume={abs/1803.03807}
}
Due to their rapid growth and deployment, Internet of things (IoT) devices have become a central aspect of our daily lives. However, they tend to have many vulnerabilities which can be exploited by an attacker. Unsupervised techniques, such as anomaly detection, can help us secure the IoT devices. However, an anomaly detection model must be trained for a long time in order to capture all benign behaviors. This approach is vulnerable to adversarial attacks since all observations are assumed to… Expand
40 Citations
A Review: Collaborative Intrusion Detection for IoT integrating the Blockchain technologies
  • H. Benaddi, Khalil Ibrahimi
  • Computer Science
  • 2020 8th International Conference on Wireless Networks and Mobile Communications (WINCOM)
  • 2020
The Semantics of Anomalies in IoT Integrated BlockChain Network
  • 2
Snort Based Collaborative Intrusion Detection System Using Blockchain in SDN
  • 3
  • PDF
CBSigIDS: Towards Collaborative Blockchained Signature-Based Intrusion Detection
  • Steven Tug, W. Meng, Yu Wang
  • Computer Science
  • 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)
  • 2018
  • 7
Poster Abstract: Towards Scalable and Trustworthy Decentralized Collaborative Intrusion Detection System for IoT
  • 3
  • PDF
A Blockchain-Based Anomalous Detection System for Internet of Things Devices
  • Highly Influenced
  • PDF
Towards Blockchained Challenge-Based Collaborative Intrusion Detection
  • 6
  • Highly Influenced
  • PDF
MBS: Multilevel Blockchain System for IoT
  • 7
Towards SDN and Blockchain based IoT Countermeasures: A Survey
...
1
2
3
4
...

References

SHOWING 1-10 OF 27 REFERENCES
An analytics framework to detect compromised IoT devices using mobility behavior
  • Mukesh Taneja
  • Computer Science
  • 2013 International Conference on ICT Convergence (ICTC)
  • 2013
  • 18
SVELTE: Real-time intrusion detection in the Internet of Things
  • 528
  • PDF
A Malicious Pattern Detection Engine for Embedded Security Systems in the Internet of Things
  • 55
  • PDF
Rolling DICE: Lightweight Remote Attestation for COTS IoT Hardware
  • 10
C-FLAT: Control-Flow Attestation for Embedded Systems Software
  • 142
  • Highly Influential
  • PDF
Blockchain: Blueprint for a New Economy
  • 1,784
Behavioral Modeling Intrusion Detection System (BMIDS) Using Internet of Things (IoT) Behavior-Based Anomaly Detection via Immunity-Inspired Algorithms
  • 41
Anomaly-based network intrusion detection: Techniques, systems and challenges
  • 1,448
  • Highly Influential
Trust Evidence for IoT: Trust Establishment from Servers to Sensors
  • 3
...
1
2
3
...