2017
DOI: 10.48550/arxiv.1709.04647
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Detection of Unauthorized IoT Devices Using Machine Learning Techniques

Yair Meidan,
Michael Bohadana,
Asaf Shabtai
et al.

Abstract: Security experts have demonstrated numerous risks imposed byInternet of Things (IoT) devices on organizations. Due to the widespread adoption of such devices, their diversity, standardization obstacles, and inherent mobility, organizations require an intelligent mechanism capable of automatically detecting suspicious IoT devices connected to their networks. In particular, devices not included in a white list of trustworthy IoT device types (allowed to be used within the organizational premises) should be detec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
49
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
4
1

Relationship

1
8

Authors

Journals

citations
Cited by 36 publications
(50 citation statements)
references
References 18 publications
1
49
0
Order By: Relevance
“…They incorporate confidence thresholds and averaged decisions within a sliding window to identify known or unknown device types. Similar research is presented in [51] and [52]. In [53], the authors also present that network traffic, device types, and their operation states (boot, active, and idle) can be inferred simultaneously.…”
Section: A Device Type Identificationsupporting
confidence: 59%
See 1 more Smart Citation
“…They incorporate confidence thresholds and averaged decisions within a sliding window to identify known or unknown device types. Similar research is presented in [51] and [52]. In [53], the authors also present that network traffic, device types, and their operation states (boot, active, and idle) can be inferred simultaneously.…”
Section: A Device Type Identificationsupporting
confidence: 59%
“…They use one-versus-rest classifiers to identify commercial devices. In [51], The authors first provide a Random Forest classifier using TCP/IP stream features. They incorporate confidence thresholds and averaged decisions within a sliding window to identify known or unknown device types.…”
Section: A Device Type Identificationmentioning
confidence: 99%
“…The third scenario represents the DBFL approach with similar characteristics as the second scenario, but a heterogeneous feature space is used. We employ the IoT device type identification dataset proposed in [15] that has 9 different types of IoT devices. The reason for the selection of the said dataset is two-fold.…”
Section: Generalized Homogeneity Using Dbfl Frameworkmentioning
confidence: 99%
“…Meidan et al used IoT traffic data to detect and white list IoT devices connected to the current network [8]. They used selected features from TCP sessions information to train their machine learning model.…”
Section: Related Workmentioning
confidence: 99%