2020
DOI: 10.1007/978-3-030-57884-8_20
|View full text |Cite
|
Sign up to set email alerts
|

IoT Device Recognition Framework Based on Network Protocol Keyword Query

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 4 publications
0
3
0
Order By: Relevance
“…Previous studies into keyword extraction can give an indication to the protocols and fields that are likely to be unencrypted, and how they can be used. The main traffic used in these studies includes broadcast traffic such as mDNS and SSDP [12], [22 -24], DHCP [12], [22][23][24], HTTP (User Agents & URI) [14], [24 -26], DNS [24,26] and packet content [27]. These protocols are all shown to give unencrypted information that is useful for analysis.…”
Section: B Specific To Keyword Extractionmentioning
confidence: 99%
See 2 more Smart Citations
“…Previous studies into keyword extraction can give an indication to the protocols and fields that are likely to be unencrypted, and how they can be used. The main traffic used in these studies includes broadcast traffic such as mDNS and SSDP [12], [22 -24], DHCP [12], [22][23][24], HTTP (User Agents & URI) [14], [24 -26], DNS [24,26] and packet content [27]. These protocols are all shown to give unencrypted information that is useful for analysis.…”
Section: B Specific To Keyword Extractionmentioning
confidence: 99%
“…These protocols are all shown to give unencrypted information that is useful for analysis. When extracted, keywords should be filtered to make them both more useful and unique [12], [24], [25]. Another technique is to combine two protocols to identify a device between manufacturers.…”
Section: B Specific To Keyword Extractionmentioning
confidence: 99%
See 1 more Smart Citation