Skip to main content

A Group-Based IoT Devices Classification Through Network Traffic Analysis Based on Machine Learning Approach

  • Conference paper
  • First Online:
Towards new e-Infrastructure and e-Services for Developing Countries (AFRICOMM 2020)

Abstract

With the rapid growth of the Internet of Things (IoT), the deployment, management, and identification of IoT devices that are connected to networks become a big concern. Consequently, they emerge as a prominent challenge either for mobile network operators who try to offer cost-effective services tailored to IoT market, or for network administrators who aim to identify as well reduce costs processing and optimize traffic management of connected environments. In order to achieve high accuracy in terms of reliability, loss and response time, new devices real time discovery techniques based on traffic characteristics are mandatory in favor of the identification of IoT connected devices.

Therefore, we design \(GBC_{-}IoT\), a group-based machine learning approach that enables to identify connected IoT devices through network traffic analysis. By leveraging well-known machine learning algorithms, \(GBC_{-}IoT\) framework identifies and categorizes IoT devices into three classes with an overall accuracy equals to roughly \(99.98\%\). Therefore, \(GBC_{-}IoT\) can efficiently identify IoT devices with less processing overhead compared to previous studies.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Pham, C., Rahim, A., Cousin, P.: Low-cost, long-range open IoT for smarter rural African villages. In: Proceedings of IEEE ISC2, pp. 1–6, Trento (2016)

    Google Scholar 

  2. Seye, M.R., Diallo, M., Gueye, B., Cambier, C.: COWShED: communication within white spots for breeders. In: Proceedings of IEEE ICIN, pp. 236–238, France (2019)

    Google Scholar 

  3. Agence Française de Développement (AFD), ASTON. https://www.afd.fr/fr/actualites/aston-transition-numerique-villes-africaines

  4. Muthoni, M.: IoT applications that work for the African continent: innovation or adoption? In: Proceedings of IEEE ICII, pp. 633–638, Porto Alegre, Brazil (2014)

    Google Scholar 

  5. Shahid, M.R., Blanc, G., Zhang, Z., Debar, H.: IoT devices recognition through network traffic analysis. In: Proceedings of IEEE ICBD, pp. 5187–5192, USA (2018)

    Google Scholar 

  6. Meidan, Y., et al.: ProfilIoT: a machine learning approach for IoT device identification based on network traffic analysis. In: Proceedings of SAC, pp. 506–509, Morocco (2017)

    Google Scholar 

  7. Meidan, Y., et al.: Detection of unauthorized IoT devices using machine learning techniques (2017). arXiv:1709.04647

  8. Sivanathan, A., et al.: Characterizing and classifying IoT traffic in smart cities and campuses. In: Proceedings of IEEE INFOCOM WKSHPS, pp. 559–564, Atlanta, GA (2017)

    Google Scholar 

  9. Sivanathan, A., et al.: Classifying IoT devices in smart environments using network traffic characteristics. In: Proceedings of IEEE Transactions on Mobile Computing, vol. 18, no. 8, pp. 1745–1759, 1 August 2019

    Google Scholar 

  10. Shafiq, M.Z., Ji, L., Liu, A.X., Pang, J., Wang, J.: Large-scale measurement and characterization of cellular machine-to-machine traffic. In: Proceedings of IEEE/ACM Transactions on Networking, vol. 21, no. 6, pp. 1960–1973, December 2013

    Google Scholar 

  11. Apthorpe, N., Reisman, D., Feamster, N.: A smart home is no castle: privacy vulnerabilities of encrypted IoT traffic (2017). arXiv:1705.06805

  12. Miettinen, M., et al.: IoT sentinel: automated device-type identification for security enforcement in IoT. In: Proceedings of ICDCS, pp. 2177–2184, Atlanta, GA (2017)

    Google Scholar 

  13. Blake, A., David, M.: Identifying encrypted malware traffic with contextual flow data. In: Proceedings of AISec, pp. 35–46 (2016)

    Google Scholar 

  14. Sivanathan, A., Sherratt, D., Gharakheili, H.H., Sivaraman, V., Vishwanath, A.: Low-cost flow-based security solutions for smart-home IoT devices. In: Proceedings of IEEE (ANTS), pp. 1–6, Bangalore (2016)

    Google Scholar 

  15. Ayyoob, H., et al.: Verifying and monitoring IoTs network behavior using MUD profiles. In: Proceedings of IEEE Transactions on Dependable and Secure Computing (2020)

    Google Scholar 

  16. Tang, Y., Zhang, Y.-Q., Huang, Z.: FCM-SVM-RFE gene feature selection algorithm for leukemia classification from microarray gene expression data. In: Proceedings of FUZZ, pp. 97–101, Reno, NV (2005)

    Google Scholar 

  17. Weiss, M., et al.: Time-aware applications, computers, and communication systems. Technical Note (NIST TN) - 1867 (2015)

    Google Scholar 

  18. Peng, L., Yang, B., Chen, Y.: Effective packet number for early stage internet traffic identification. Neurocomput. J. 156(25), 252–267 (2015)

    Google Scholar 

  19. Li, Y., Noseworthy, B., Laird, J., Winters, T., Carlin, T.: A study of precision of hardware time stamping packet traces. In: Proceedings of IEEE ISPCS, pp. 102–107, Austin, TX (2014)

    Google Scholar 

  20. Prasad, A., Iverson, L., Liaw, A.: Newer classification and regression tree techniques: bagging and random forests for ecological prediction. Ecosyst. J. 9, 181–199 (2006)

    Article  Google Scholar 

  21. Thanh Noi, P., Kappas, M.: Comparison of random forest, k-nearest neighbor, and support vector machine classifiers for land cover classification using sentinel-2 imagery. Sens. J. 18(1), 18 (2017)

    Article  Google Scholar 

  22. Linlin, W., Peng, L., Su, M., Yang, B., Zhou, X.: On the impact of packet inter arrival time for early stage traffic identification. In: Proceedings of IEEE iThings and IEEE GreenCom and IEEE CPSCom and IEEE SmartData, pp. 510–515, Chengdu, China (2016)

    Google Scholar 

  23. Qazi, Z.A., et al.: Application-awareness in SDN. In: Proceedings of ACM SIGCOMM, pp. 487–488, NY, USA (2013)

    Google Scholar 

  24. Este, A., Gringoli, F., Salgar elli, L.: On the stability of the information carried by traffic flow features at the packet level. Comput. Commun. Rev. J. 39, 13–18 (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Avewe Bassene .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Bassene, A., Gueye, B. (2021). A Group-Based IoT Devices Classification Through Network Traffic Analysis Based on Machine Learning Approach. In: Zitouni, R., Phokeer, A., Chavula, J., Elmokashfi, A., Gueye, A., Benamar, N. (eds) Towards new e-Infrastructure and e-Services for Developing Countries. AFRICOMM 2020. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 361. Springer, Cham. https://doi.org/10.1007/978-3-030-70572-5_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-70572-5_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-70571-8

  • Online ISBN: 978-3-030-70572-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics