2020
DOI: 10.1109/access.2020.3026818
|View full text |Cite
|
Sign up to set email alerts
|

Cross-Layer Protocol Fingerprint for Large-Scale Fine-Grain Devices Identification

Abstract: Internet-connected Internet of Things (IoT) devices are exploding, which pose a significant threat for their management and security protection. IoT device identification is a prerequisite for discovering, monitoring, and protecting these devices. Although the existing proactive identification methods based on protocol fingerprint can discover and identify large-scale IoT devices, the fingerprint granularity is difficult to meet the requirements of security risk assessment for large-scale IoT devices. Since Io… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(8 citation statements)
references
References 16 publications
0
8
0
Order By: Relevance
“…Each classifier is responsible for analyzing specific port data, which greatly shortens the cycle of device identification and increases the identification accuracy by 46.67%. Yu et al [11] used Convolutional Neural Networks (CNN) and Long Short-Term Memory Networks (LSTM) to extract and construct the characteristic fingerprints of HTTP and TCP cross-layer data packets to achieve high-precision and finegrained IoT device identification. In [13,[23][24][25][26][27][28][29][30], an inspection of data packets was used to extract device features.…”
Section: Traffic-based Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…Each classifier is responsible for analyzing specific port data, which greatly shortens the cycle of device identification and increases the identification accuracy by 46.67%. Yu et al [11] used Convolutional Neural Networks (CNN) and Long Short-Term Memory Networks (LSTM) to extract and construct the characteristic fingerprints of HTTP and TCP cross-layer data packets to achieve high-precision and finegrained IoT device identification. In [13,[23][24][25][26][27][28][29][30], an inspection of data packets was used to extract device features.…”
Section: Traffic-based Methodsmentioning
confidence: 99%
“…DAN et al [11] proposed a cross-layer protocol fingerprinting technique for finegrained device identification. This approach utilized a convolutional neural network (CNN) and a long short-term memory network (LSTM) to extract and construct feature fingerprints.…”
Section: Banner-based Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Prior to this paper, there were also methods using multilayer network protocols for device identification [19], but their methods only considered correlation between fields and ignored causality, which led to the selection of redundant features for device identification. To solve these problems, this paper needs to find an IoT device identification method that can take into account time, labor cost, and feature selection causality.…”
Section: Device Identificationmentioning
confidence: 99%
“…Table 1 shows the key features of both device type and device model granularity selected in this paper for HTTP/TCP and SSH/TCP protocol clusters. In order to evaluate the effectiveness of the features selected by the feature selection method in this paper, the features selected by the causal feature selection method are compared with the traditional statistical-based feature selection algorithms Percentile [29], FWE [30], RFE [31], variance threshold [32], and Chi2 [33] and manually selected features [19]. The features selected under HTTP/TCP protocols were used in comparison experiments using the same classifier and training methods.…”
Section: Evaluation Of Feature Selectionmentioning
confidence: 99%