DEFT: A Distributed IoT Fingerprinting Technique

被引:109
作者
Thangavelu, Vijayanand [1 ]
Divakaran, Dinil Mon [2 ]
Sairam, Rishi [1 ]
Bhunia, Suman Sankar [1 ]
Gurusamy, Mohan [1 ]
机构
[1] Natl Univ Singapore, Elect & Comp Engn Dept, Singapore, Singapore
[2] Singtel, Cyber Secur R&D Div, Singapore, Singapore
基金
新加坡国家研究基金会;
关键词
Fingerprint; identification; IoT; network; network function virtualization (NFV); security;
D O I
10.1109/JIOT.2018.2865604
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Identifying IoT devices connected to a network has multiple security benefits, such as deployment of behavior-based anomaly detectors, automated vulnerability patching of specific device types, dynamic attack mitigation, etc. In this paper, we look into the problem of IoT device identification at network level, in particular from an ISP's perspective. The simple solution of deploying a supervised machine learning algorithm at a centralized location in the network neither scales well nor can identify new devices. To tackle these challenges, we propose and develop a distributed device fingerprinting technique (DEFT), a distributed fingerprinting solution that addresses and exploits the presence of common devices, including new devices, across smart homes and enterprises in a network. A DEFT controller develops and maintains classifiers for fingerprinting, while gateways located closer to the IoT devices at homes perform device classification. Importantly, the controller and gateways coordinate to identify new devices in the network. DEFT is designed to be scalable and dynamic-it can be deployed, orchestrated, and controlled using software-defined networking and network function virtualization. DEFT is able to identify new device types automatically, while achieving high accuracy and low false positive rate. We demonstrate the effectiveness of DEFT by experimenting on data obtained from real-world IoT devices.
引用
收藏
页码:940 / 952
页数:13
相关论文
共 25 条
[1]  
Anderson B., 2017, P IEEE C COMM NETW S, P1
[2]   Machine Learning for Encrypted Malware Traffic Classification: Accounting for Noisy Labels and Non-Stationarity [J].
Anderson, Blake ;
McGrew, David .
KDD'17: PROCEEDINGS OF THE 23RD ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, 2017, :1723-1732
[3]  
[Anonymous], 2017, IOT CONN OUTL MOB RE
[4]  
Antonakakis M, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P1093
[5]  
Apthorpe N., 2016, WORKSH DAT DAT
[6]  
Apthorpe N. J., 2017, ABS170805044 CORR
[7]  
Baldini G., 2017, 2017 International Carnahan Conference on Security Technology (ICCST), P1
[8]  
Basu S., 2002, MACHINE LEARNING, P27
[9]   DECANTeR: DEteCtion of Anomalous outbouNd HTTP TRaffic by Passive Application Fingerprinting [J].
Bortolameotti, Riccardo ;
van Ede, Thijs ;
Caselli, Marco ;
Everts, Maarten H. ;
Hartel, Pieter ;
Hofstede, Rick ;
Jonker, Willem ;
Peter, Andreas .
33RD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2017), 2017, :373-386
[10]  
Fonseka P, 2018, 2018 IEEE 4TH WORLD FORUM ON INTERNET OF THINGS (WF-IOT), P736, DOI 10.1109/WF-IoT.2018.8355105