Abstract
One of the main challenges in securing an IoT environment concerns traffic monitoring because an IoT hub typically cannot provide coverage for all devices or control all of their communications. Moreover, sophisticated distributed cyber-attacks may have multiple steps launched from various applications and devices, making them very challenging to detect through individual analysis of loca…