A Comprehensive Study of Supervised Machine Learning Assisted Approaches for IoT Device Identification

被引:1
作者
Wang, Yong [1 ]
Rimal, Bhaskar P. [2 ]
Koball, Carson [1 ]
Fahnlander, Michael [1 ]
Scheaffer, Julia [1 ]
Hammrich, Joshua [1 ]
Gentry, Paolo [1 ]
Westlund, Dylan [1 ]
Salmen, Tyler [1 ]
Ford, Connor [1 ]
机构
[1] Dakota State Univ, PATRIOT Lab, Madison, SD 57042 USA
[2] Univ Idaho, Dept Comp Sci, Moscow, ID USA
来源
2024 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS, ICNC | 2024年
关键词
Device Identification; Internet of Things; Machine Learning; CICFlowMeter plus; Cryptojacking; DOS;
D O I
10.1109/ICNC59896.2024.10556143
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Device identification is a fundamental issue in the Internet of Things. A few studies in modern literature indicate that machine learning approaches could be used for device identification. However, the hypothesis that device behavior could be characterized by machine learning techniques for device identification has not been thoroughly investigated. Therefore, we conduct a comprehensive study to examine this hypothesis. We create both a trusted and untrusted environment for experimental testing scenarios. That contains four testing cases, including intra-network, network perimeter, cryptojacking, and DOS. Six supervised machine learning classifiers are selected and evaluated. Among the six classifiers, the AdaBoost classifier with 200 features achieves testing accuracies of 88.23% and is chosen for the testing cases. Our evaluation results show that the AdaBoost classifier is promising for a trusted environment. However, the accuracies of the AdaBoost classifier drop dramatically to less than 20% in both cryptojacking and DOS cases. While the results do not support the hypothesis, the challenges faced by machine learning-assisted approaches in device identification could be complemented by other safeguards such as whitelists and intrusion detection and prevention systems. This paper further discusses future work, including using features from physical layers to examine the hypothesis.
引用
收藏
页码:221 / 227
页数:7
相关论文
共 27 条
[1]  
Aksoy A, 2019, IEEE ICC
[2]   Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications [J].
Al-Fuqaha, Ala ;
Guizani, Mohsen ;
Mohammadi, Mehdi ;
Aledhari, Mohammed ;
Ayyash, Moussa .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04) :2347-2376
[3]   AN INTRODUCTION TO KERNEL AND NEAREST-NEIGHBOR NONPARAMETRIC REGRESSION [J].
ALTMAN, NS .
AMERICAN STATISTICIAN, 1992, 46 (03) :175-185
[4]  
Bekerman D, 2015, IEEE CONF COMM NETW, P134, DOI 10.1109/CNS.2015.7346821
[5]   Unsupervised machine learning for network-centric anomaly detection in IoT [J].
Bhatia, Randeep ;
Benno, Steven ;
Esteban, Jairo ;
Lakshman, T., V ;
Grogan, John .
BIG-DAMA'19: PROCEEDINGS OF THE 3RD ACM CONEXT WORKSHOP ON BIG DATA, MACHINE LEARNING AND ARTIFICIAL INTELLIGENCE FOR DATA COMMUNICATION NETWORKS, 2019, :42-48
[6]   Random forests [J].
Breiman, L .
MACHINE LEARNING, 2001, 45 (01) :5-32
[7]   DISCRIMINATORY ANALYSIS - NONPARAMETRIC DISCRIMINATION - CONSISTENCY PROPERTIES [J].
FIX, E ;
HODGES, JL .
INTERNATIONAL STATISTICAL REVIEW, 1989, 57 (03) :238-247
[8]   A decision-theoretic generalization of on-line learning and an application to boosting [J].
Freund, Y ;
Schapire, RE .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 1997, 55 (01) :119-139
[9]   A Machine-Learning-Based Tool for Passive OS Fingerprinting With TCP Variant as a Novel Feature [J].
Hagos, Desta Haileselassie ;
Yazidi, Anis ;
Kure, Oivind ;
Engelstad, Paal E. .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (05) :3534-3553
[10]   IoT Device Identification via Network-Flow Based Fingerprinting and Learning [J].
Hamad, Salma Abdalla ;
Zhang, Wei Emma ;
Sheng, Quan Z. ;
Nepal, Surya .
2019 18TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS/13TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (TRUSTCOM/BIGDATASE 2019), 2019, :103-111