{"id":"https://openalex.org/W4401537842","doi":"https://doi.org/10.1109/lanman61958.2024.10621894","title":"IoTHaven: An Online Defense System to Mitigate Remote Injection Attacks in Trigger-action IoT Platforms","display_name":"IoTHaven: An Online Defense System to Mitigate Remote Injection Attacks in Trigger-action IoT Platforms","publication_year":2024,"publication_date":"2024-07-10","ids":{"openalex":"https://openalex.org/W4401537842","doi":"https://doi.org/10.1109/lanman61958.2024.10621894"},"language":"en","primary_location":{"id":"doi:10.1109/lanman61958.2024.10621894","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lanman61958.2024.10621894","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE 30th International Symposium on Local and Metropolitan Area Networks (LANMAN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5020889298","display_name":"Md Morshed Alam","orcid":"https://orcid.org/0000-0003-2877-5345"},"institutions":[{"id":"https://openalex.org/I102149020","display_name":"University of North Carolina at Charlotte","ror":"https://ror.org/04dawnj30","country_code":"US","type":"education","lineage":["https://openalex.org/I102149020"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Md Morshed Alam","raw_affiliation_strings":["University of North Carolina at Charlotte,Department of Software and Information Systems,Charlotte,USA"],"affiliations":[{"raw_affiliation_string":"University of North Carolina at Charlotte,Department of Software and Information Systems,Charlotte,USA","institution_ids":["https://openalex.org/I102149020"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074220260","display_name":"Arrasy Rahman","orcid":"https://orcid.org/0000-0003-1006-9653"},"institutions":[{"id":"https://openalex.org/I102149020","display_name":"University of North Carolina at Charlotte","ror":"https://ror.org/04dawnj30","country_code":"US","type":"education","lineage":["https://openalex.org/I102149020"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"A B M Mohaimenur Rahman","raw_affiliation_strings":["University of North Carolina at Charlotte,Department of Software and Information Systems,Charlotte,USA"],"affiliations":[{"raw_affiliation_string":"University of North Carolina at Charlotte,Department of Software and Information Systems,Charlotte,USA","institution_ids":["https://openalex.org/I102149020"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5110551419","display_name":"Weichao Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I102149020","display_name":"University of North Carolina at Charlotte","ror":"https://ror.org/04dawnj30","country_code":"US","type":"education","lineage":["https://openalex.org/I102149020"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Weichao Wang","raw_affiliation_strings":["University of North Carolina at Charlotte,Department of Software and Information Systems,Charlotte,USA"],"affiliations":[{"raw_affiliation_string":"University of North Carolina at Charlotte,Department of Software and Information Systems,Charlotte,USA","institution_ids":["https://openalex.org/I102149020"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5020889298"],"corresponding_institution_ids":["https://openalex.org/I102149020"],"apc_list":null,"apc_paid":null,"fwci":0.7787,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.69303692,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"15","last_page":"20"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9757000207901001,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.7831607460975647},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6512783765792847},{"id":"https://openalex.org/keywords/action","display_name":"Action (physics)","score":0.5925111770629883},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4958382546901703}],"concepts":[{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.7831607460975647},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6512783765792847},{"id":"https://openalex.org/C2780791683","wikidata":"https://www.wikidata.org/wiki/Q846785","display_name":"Action (physics)","level":2,"score":0.5925111770629883},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4958382546901703},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/lanman61958.2024.10621894","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lanman61958.2024.10621894","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE 30th International Symposium on Local and Metropolitan Area Networks (LANMAN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W1522301498","https://openalex.org/W2025113626","https://openalex.org/W2046033161","https://openalex.org/W2054127354","https://openalex.org/W2064675550","https://openalex.org/W2076337359","https://openalex.org/W2121805588","https://openalex.org/W2947175569","https://openalex.org/W2986164614","https://openalex.org/W3007016253","https://openalex.org/W3156544905","https://openalex.org/W3159748891","https://openalex.org/W3181227461","https://openalex.org/W4221152368","https://openalex.org/W4289559981","https://openalex.org/W4324007228","https://openalex.org/W4400276264","https://openalex.org/W6631190155","https://openalex.org/W6754979079","https://openalex.org/W6780559895","https://openalex.org/W6782007757","https://openalex.org/W6794187937","https://openalex.org/W6812742317"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W4245926026","https://openalex.org/W4311097251","https://openalex.org/W2586548817","https://openalex.org/W2390279801","https://openalex.org/W2625093826","https://openalex.org/W2950174689","https://openalex.org/W2358668433","https://openalex.org/W4200598720"],"abstract_inverted_index":{"Trigger-action":[0],"Internet":[1],"of":[2,13],"Things":[3],"(loT)":[4],"platforms":[5],"allow":[6],"loT":[7,24,38,54,82],"devices":[8,31,55,83],"to":[9,15,36,49,64,75,79,84,104,162],"create":[10],"a":[11],"chain":[12,48],"interactions":[14],"automate":[16],"network":[17,30,102,141],"tasks":[18],"by":[19,40,57,69],"leveraging":[20],"functional":[21],"dependencies":[22],"between":[23],"event":[25,42,73],"conditions":[26,74],"and":[27],"actions.":[28],"When":[29],"notify":[32],"their":[33],"cyber":[34],"states":[35],"the":[37,44,77,94,152,164],"hub":[39,45,78],"reporting":[41,71],"conditions,":[43],"utilizes":[46],"this":[47,62,120],"invoke":[50],"actions":[51,87],"in":[52,93],"corresponding":[53],"dictated":[56],"user-defined":[58],"rules.":[59],"Adversaries":[60],"exploit":[61],"scenario":[63],"implement":[65],"remote":[66,131],"injection":[67,111,132],"attacks":[68,112,133],"maliciously":[70],"fake":[72],"force":[76],"command":[80],"target":[81],"perform":[85],"invalid":[86],"violating":[88],"rule":[89],"integrity.":[90],"Security":[91],"mechanisms":[92],"existing":[95],"literature":[96],"either":[97],"require":[98],"complete":[99],"visibility":[100,139],"over":[101,140],"events":[103],"provide":[105],"an":[106,125,147,158],"effective":[107],"defense":[108,127,149,166],"against":[109],"dynamic":[110],"or":[113],"do":[114],"not":[115],"offer":[116],"real-time":[117],"security.":[118],"In":[119],"paper,":[121],"we":[122],"propose":[123],"Io'I'Haven,":[124],"online":[126],"system":[128,144],"that":[129,174],"counters":[130,177],"at":[134,168,180],"runtime.":[135],"Even":[136],"with":[137,182],"partial":[138],"states,":[142],"our":[143],"can":[145],"discern":[146],"optimal":[148,165],"policy,":[150],"maximizing":[151],"overall":[153],"security":[154],"gain.":[155],"We":[156],"train":[157],"LSTM-based":[159],"function":[160],"approximator":[161],"determine":[163],"action":[167],"each":[169],"timestep.":[170],"Experimental":[171],"results":[172],"show":[173],"IotHaven":[175],"effectively":[176],"attack":[178],"progression":[179],"runtime":[181],"minimal":[183],"computation":[184],"overhead.":[185]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2025-12-21T23:12:01.093139","created_date":"2025-10-10T00:00:00"}
