Locality-Sensitive IoT Network Traffic Fingerprinting for Device Identification

作者: Batyr Charyyev , Mehmet Hadi Gunes

DOI: 10.1109/JIOT.2020.3035087

关键词:

摘要: Engineered systems get smarter with computing capabilities, particularly through a multitude of Internet-of-Things (IoT) devices. IoT devices, however, are prone to be compromised as they often resource limited and optimized for certain task. They lack power security software hence, have become major target malicious activities. In order secure network, administrators may isolate vulnerable devices limit traffic device based on its communication needs. this article, we introduce novel approach identify an the locality-sensitive hash flow. Different from previous studies that employ machine learning, proposed does not require feature extraction data, operates in all states (e.g., setup, idle, active), retrain model when new type/version is introduced. The evaluation results different data sets show our achieves precision recall above 90% average performs equally well compared state-of-the-art learning-based methods.

参考文章(43)
Stefano Paraboschi, Sabrina De Capitani di Vimercati, Pierangela Samarati, Ernesto Damiani, An Open Digest-based Technique for Spam Detection. iasted international conference on parallel and distributed computing and systems. pp. 559- 564 ,(2004)
Konstantin Berlin, Sergey Koren, Chen-Shan Chin, James P Drake, Jane M Landolin, Adam M Phillippy, Assembling large genomes with single-molecule sequencing and locality-sensitive hashing Nature Biotechnology. ,vol. 33, pp. 623- 630 ,(2015) , 10.1038/NBT.3238
Muhammad N. Marsono, Packet-level open-digest fingerprinting for spam detection on middleboxes International Journal of Network Management. ,vol. 22, pp. 12- 26 ,(2012) , 10.1002/NEM.780
Jonathan Oliver, Chun Cheng, Yanggui Chen, TLSH -- A Locality Sensitive Hash 2013 Fourth Cybercrime and Trustworthy Computing Workshop. pp. 7- 13 ,(2013) , 10.1109/CTC.2013.9
Fabian Lanze, Andriy Panchenko, Benjamin Braatz, Andreas Zinnen, Clock skew based remote device fingerprinting demystified global communications conference. pp. 813- 819 ,(2012) , 10.1109/GLOCOM.2012.6503213
Christoph Neumann, Olivier Heen, Stephane Onno, An Empirical Study of Passive 802.11 Device Fingerprinting international conference on distributed computing systems workshops. pp. 593- 602 ,(2012) , 10.1109/ICDCSW.2012.8
Vassil Roussev, An evaluation of forensic similarity hashes Digital Investigation. ,vol. 8, ,(2011) , 10.1016/J.DIIN.2011.05.005
M.E. Crovella, A. Bestavros, Self-similarity in World Wide Web traffic: evidence and possible causes IEEE ACM Transactions on Networking. ,vol. 5, pp. 835- 846 ,(1997) , 10.1109/90.650143
Shiyan Hu, Efficient video retrieval by locality sensitive hashing international conference on acoustics, speech, and signal processing. ,vol. 2, pp. 449- 452 ,(2005) , 10.1109/ICASSP.2005.1415438
Ying Zhang, Huchuan Lu, Lihe Zhang, Xiang Ruan, Shun Sakai, Video anomaly detection based on locality sensitive hashing filters Pattern Recognition. ,vol. 59, pp. 302- 311 ,(2016) , 10.1016/J.PATCOG.2015.11.018