2023
DOI: 10.1007/s10922-022-09716-x
|View full text |Cite
|
Sign up to set email alerts
|

A Deep Learning Approach for Classifying Network Connected IoT Devices Using Communication Traffic Characteristics

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(3 citation statements)
references
References 51 publications
0
3
0
Order By: Relevance
“…IP Spoofing: IP spoofing allows attackers to impersonate legitimate sources, leading to potential security breaches. IP spoofing at the TCP/IP internet layer involves the manipulation of packet headers to alter the source IP address, making the traffic appear as though it is coming from a different, trusted source rather than the attacker's actual location [64], [65]. Figure 4 depicts how IP spoofing attacks are perpetrated.…”
Section: Figure 3 Dos Attackmentioning
confidence: 99%
“…IP Spoofing: IP spoofing allows attackers to impersonate legitimate sources, leading to potential security breaches. IP spoofing at the TCP/IP internet layer involves the manipulation of packet headers to alter the source IP address, making the traffic appear as though it is coming from a different, trusted source rather than the attacker's actual location [64], [65]. Figure 4 depicts how IP spoofing attacks are perpetrated.…”
Section: Figure 3 Dos Attackmentioning
confidence: 99%
“…This method can be used in developing ML techniques to detect attacks. R. R. Chowdhury et al [24] present a deep learning method that can be used to identify the presence of IoT devices in a network traffic. It is able to perform high-precision calculations even in scenarios involving traffic congestion and noise.…”
Section: ░ 2 Related Workmentioning
confidence: 99%
“…It plays a crucial role in protecting network security, enhancing network reliability, safeguarding privacy, and facilitating device management, among other critical aspects. Therefore, identifying IoT devices is of paramount importance in improving network security [10].…”
Section: Introductionmentioning
confidence: 99%