2018 IEEE Symposium on Computers and Communications (ISCC) 2018
DOI: 10.1109/iscc.2018.8538630
|View full text |Cite
|
Sign up to set email alerts
|

An efficient approach for device identification and traffic classification in IoT ecosystems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 36 publications
(17 citation statements)
references
References 14 publications
0
17
0
Order By: Relevance
“…There are plenty of studies on IoT device type classification or fingerprinting in the literature [14], [46]- [54]. Those studies concentrate on identifying IoT devices type for different reasons including security, access control, provisioning, resource allocation, and management [47]. Actually, most of those studies concentrate on security in response to recent incidents [55], [56].…”
Section: A Use Case: Iot Device Type Classificationmentioning
confidence: 99%
“…There are plenty of studies on IoT device type classification or fingerprinting in the literature [14], [46]- [54]. Those studies concentrate on identifying IoT devices type for different reasons including security, access control, provisioning, resource allocation, and management [47]. Actually, most of those studies concentrate on security in response to recent incidents [55], [56].…”
Section: A Use Case: Iot Device Type Classificationmentioning
confidence: 99%
“…Conventionally attributes, such as number of packets in a flow, frequency of flows, inter arrival time between packets within a flow, size of the packet, etc., are used as unique identifiers for each device type. Both supervised [6,7,9,10], unsupervised [11,12], and deep learning [13,14] methods have been used for classification.…”
Section: Classification Using Flow Characteristicsmentioning
confidence: 99%
“…In particular, they refer to synchronized data, SQLite databases and cache files containing connection information to IoT platforms. There is also work on understanding event logs [15], [16] and analyzing local network flow [17]- [19], particularly in the context of intrusion detection [20], [21].…”
Section: A Forensic Artefacts From Iot Productsmentioning
confidence: 99%
“…The victim is lying on the bed in room 2. She has an Apple Watch series 3 (18) on her right arm and an iPhone SE (19) in her pocket. Hidden in the bed, there is a sleep sensor named Terraillon Dot (20).…”
Section: A Presentation Of the Crime Scenementioning
confidence: 99%