Habibi Lashkari, ArashShafi, MohammadMoein2025-04-102025-04-102024-12-022025-04-10https://hdl.handle.net/10315/42816In recent years, IoT technology has transformed smart homes, with most households now including several IoT devices that provide convenience and automation. However, the security of these smart homes is paramount, as vulnerabilities can expose residents to risks like unauthorized access, data breaches, and operational disruption. Network-based threats pose a particularly critical risk due to the numerous vulnerabilities in wireless communication between devices, making it possible for attackers to intercept data or do malicious activities. While traditional intrusion detection systems exist, they are often ineffective in detecting zero-day attacks and lack the ability to identify malicious patterns across diverse threat scenarios due to limited diversity in their detection models. Moreover, these systems are not designed to fully detect all types of intrusions, especially those involving both external network activities and internal IoT communications among smart home devices. This gap is made worse by the challenges in creating specialized IoT datasets that cover a diverse set of malicious activities and data types, which require extensive technical knowledge, a diverse range of devices, and expertise in capturing, executing, and labeling attack scenarios. Such datasets are crucial for data-driven intrusion detection systems. Addressing these challenges, this thesis introduces a dual-tier detection system that effectively can zero-day attacks, and is designed in a way to be scalable for learning the behavior of diverse malicious activities. the proposed solution leverages data from both the smart home hub’s internet connection and the internal network communication of IoT devices to detect and profile malicious activities using a novel graph learning approach. Furthermore, to support this research, we have created the largest IoT smart home dataset, incorporating real-world data from over 50 devices and more than 100 carefully designed attack scenarios, captured over a five-month period. The analysis of this dataset and the performance of our detection model demonstrate promising results, providing a valuable resource and foundation for advancing smart home IoT security.Author owns copyright, except where explicitly noted. Please contact the author directly with licensing requests.Intruders' Behavior Unveiled: A Dual-Tier Behavior-driven Model for Malicious Activity Detection in IoT Network Using Graph LearningElectronic Thesis or Dissertation2025-04-10Internet of Things (IoT)Smart home securityIoT vulnerabilitiesNetwork-based threatsWireless communication securityIoT device-to-device communicationIntrusion detection systems (IDS)Zero-day attack detectionMulti-tier detection modelIoT threat profilingGraph-based learningIoT network traffic analysisZ-wave protocol securityIoT wireless protocolsWi-FiZigbeeBluetoothZ-WaveDataset for IoT securitySmart home testbed developmentIoT attack scenario designReal-world IoT datasetMalicious activity detectionIoT traffic monitoringIoT data labeling and analysisIoT dataset benchmarkingIoT device behavior analysisSmart home automation risksIoT privacy concernsIoT device taxonomyIoT communication patternsIoT security challengesIoT research frameworksIoT threat landscapeIoT network anomaliesIoT ecosystem securitySmart home threat detectionIoT attack simulationAdvanced IoT security solutionsIoT traffic analysisIoT data capture techniquesIoT security evaluationIoT cybersecurityIoT attack detectionIoT defense mechanismsIoT behavioral analyticsScalable IoT security modelIoT dataset creation challengesIoT intrusion detectionIoT network forensicsIoT device interoperability securityEmerging IoT threatsIoT threat intelligenceIoT security best practicesIoT Detection algorithm designIoT ecosystem resilienceIoT data-driven security modelSmart office securitySmart office networksSmart home automation securitySmart office automationIoT-enabled smart officesSmart office vulnerabilitiesSmart home device securitySmart office device managementIoT in smart workspacesSmart building cybersecurityIoT-driven smart environmentsSmart office data privacyIoT-based smart infrastructureSmart home energy efficiency risksIoT in smart office designIoT threats in smart workplacesCollaborative IoT workspacesCybersecurity for smart officesSmart home network architectureSecure smart office solutionsAutomation risks in smart environmentsIoT connectivity in smart homes and officesSmart environment intrusion detectionIoT in smart home monitoring systems