Proceedings of the 2020 4th International Conference on Big Data and Internet of Things 2020
DOI: 10.1145/3421537.3421545
|View full text |Cite
|
Sign up to set email alerts
|

Network Traffic Analysis based IoT Device Identification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
22
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1
1

Relationship

2
5

Authors

Journals

citations
Cited by 22 publications
(22 citation statements)
references
References 12 publications
0
22
0
Order By: Relevance
“…Due to its perceived potential, researchers [5], [6], [11], [14], [15] have been analyzing communication traffic traces of network-connected devices, to extract device-specific fingerprints, which may be used for classification and distinguishing between IoT and non-IoT devices in a network. A set of features can be extracted from the different layers of the communication models [13], through statistical measurements of the packets, either from the packet's payload or protocols information.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Due to its perceived potential, researchers [5], [6], [11], [14], [15] have been analyzing communication traffic traces of network-connected devices, to extract device-specific fingerprints, which may be used for classification and distinguishing between IoT and non-IoT devices in a network. A set of features can be extracted from the different layers of the communication models [13], through statistical measurements of the packets, either from the packet's payload or protocols information.…”
Section: Related Workmentioning
confidence: 99%
“…Furthermore, the classifier was able to distinguish device type with high accuracy. On the other [11], [20], the researchers presented DFP models for classifying devices using only packet information, whilst 82% and 83.35% accuracies gain with 212 and 161 features, respectively, including source packet length, checksum, and protocol number.…”
Section: Related Workmentioning
confidence: 99%
“… The datasets will help researchers in optimizing and analyzing network communication used by IoT devices in an IoT network, e.g. device identification [1 , 2] , and device log prediction [3] are some of the techniques developed for IoT security by analyzing the network communication behaviour. The given IoT datasets can be analyzed by researchers in the context of network bandwidth and storage capability required for home or office automation since data were recorded in a separate file every day.…”
Section: Value Of the Datamentioning
confidence: 99%
“…The datasets will help researchers in optimizing and analyzing network communication used by IoT devices in an IoT network, e.g. device identification [1 , 2] , and device log prediction [3] are some of the techniques developed for IoT security by analyzing the network communication behaviour.…”
Section: Value Of the Datamentioning
confidence: 99%
“…Recently, device identification by learning from traffic features has become a hotspot of research. The related supervised ML algorithms [14] include Random Forest (RF) [15][16][17][18], K-Nearest Neighbors (KNN) [19], Support Vector Machine (SVM) [20][21][22], Gradient boosting [23], Naive Bayes [24,25], Decision Trees (DT) [26], NLP [27], and so on. The related unsupervised ML methods include the Gibbs Sampling Dirichlet Multinomial Mixture Model (GSDMM) [28], Density-Based Spatial Clustering of Applications with Noise (DBSCAN) [29], Kmeans [30], and so on.…”
Section: Introductionmentioning
confidence: 99%