IoTDevID: A Behavior-Based Device Identification Method for the IoT

被引:27
作者
Kostas, Kahraman [1 ]
Just, Mike [1 ]
Lones, Michael A. [1 ]
机构
[1] Heriot Watt Univ, Dept Comp Sci, Edinburgh EH14 4AS, Midlothian, Scotland
关键词
Fingerprinting; Internet of Things (IoT) security; machine learning; INTERNET;
D O I
10.1109/JIOT.2022.3191951
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Device identification (DI) is one way to secure a network of Internet of Things (IoT) devices, whereby devices identified as suspicious can subsequently be isolated from a network. In this study, we present a machine-learning-based method, IoTDevID, that recognizes devices through the characteristics of their network packets. As a result of using a rigorous feature analysis and selection process, our study offers a generalizable and realistic approach to modeling device behavior, achieving high predictive accuracy across two public data sets. The model's underlying feature set is shown to be more predictive than existing feature sets used for DI and is shown to generalize to data unseen during the feature selection process. Unlike most existing approaches to IoT DI, IoTDevID is able to detect devices using non-IP and low-energy protocols.
引用
收藏
页码:23741 / 23749
页数:9
相关论文
共 15 条
  • [1] Aksoy A, 2019, IEEE ICC
  • [2] A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security
    Al-Garadi, Mohammed Ali
    Mohamed, Amr
    Al-Ali, Abdulla Khalid
    Du, Xiaojiang
    Ali, Ihsan
    Guizani, Mohsen
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (03): : 1646 - 1685
  • [3] SoK: Security Evaluation of Home-Based IoT Deployments
    Alrawi, Omar
    Lever, Chaz
    Antonakakis, Manos
    Monrose, Fabian
    [J]. 2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019), 2019, : 1362 - 1380
  • [4] [Anonymous], 2019, IOT MARKET SIZE GROW
  • [5] Behavioral Fingerprinting of IoT Devices
    Bezawada, Bruhadeshwar
    Bachani, Maalvika
    Peterson, Jordan
    Shirazi, Hossein
    Ray, Indrakshi
    Ray, Indrajit
    [J]. PROCEEDINGS OF THE 2018 WORKSHOP ON ATTACKS AND SOLUTIONS IN HARDWARE SECURITY (ASHES'18), 2018, : 41 - 50
  • [6] IoT Device Identification via Network-Flow Based Fingerprinting and Learning
    Hamad, Salma Abdalla
    Zhang, Wei Emma
    Sheng, Quan Z.
    Nepal, Surya
    [J]. 2019 18TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS/13TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (TRUSTCOM/BIGDATASE 2019), 2019, : 103 - 111
  • [7] Detecting Volumetric Attacks on IoT Devices via SDN-Based Monitoring of MUD Activity
    Hamza, Ayyoob
    Gharakheili, Hassan Habibi
    Benson, Theophilus A.
    Sivaraman, Vijay
    [J]. SOSR '19: PROCEEDINGS OF THE 2019 ACM SYMPOSIUM ON SDN RESEARCH, 2019, : 36 - 48
  • [8] Machine Learning in IoT Security: Current Solutions and Future Challenges
    Hussain, Fatima
    Hussain, Rasheed
    Hassan, Syed Ali
    Hossain, Ekram
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (03): : 1686 - 1721
  • [9] An LSTM-Based Deep Learning Approach for Classifying Malicious Traffic at the Packet Level
    Hwang, Ren-Hung
    Peng, Min-Chun
    Van-Linh Nguyen
    Chang, Yu-Lun
    [J]. APPLIED SCIENCES-BASEL, 2019, 9 (16):
  • [10] Internet of things security: A top-down survey
    Kouicem, Djamel Eddine
    Bouabdallah, Abdelmadjid
    Lakhlef, Hicham
    [J]. COMPUTER NETWORKS, 2018, 141 : 199 - 221