Abstract
With the rapid growth of the Internet of Things (IoT), the deployment, management, and identification of IoT devices that are connected to networks become a big concern. Consequently, they emerge as a prominent challenge either for mobile network operators who try to offer cost-effective services tailored to IoT market, or for network administrators who aim to identify as well reduce costs processing and optimize traffic management of connected environments. In order to achieve high accuracy in terms of reliability, loss and response time, new devices real time discovery techniques based on traffic characteristics are mandatory in favor of the identification of IoT connected devices.
Therefore, we design \(GBC_{-}IoT\), a group-based machine learning approach that enables to identify connected IoT devices through network traffic analysis. By leveraging well-known machine learning algorithms, \(GBC_{-}IoT\) framework identifies and categorizes IoT devices into three classes with an overall accuracy equals to roughly \(99.98\%\). Therefore, \(GBC_{-}IoT\) can efficiently identify IoT devices with less processing overhead compared to previous studies.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Pham, C., Rahim, A., Cousin, P.: Low-cost, long-range open IoT for smarter rural African villages. In: Proceedings of IEEE ISC2, pp. 1–6, Trento (2016)
Seye, M.R., Diallo, M., Gueye, B., Cambier, C.: COWShED: communication within white spots for breeders. In: Proceedings of IEEE ICIN, pp. 236–238, France (2019)
Agence Française de Développement (AFD), ASTON. https://www.afd.fr/fr/actualites/aston-transition-numerique-villes-africaines
Muthoni, M.: IoT applications that work for the African continent: innovation or adoption? In: Proceedings of IEEE ICII, pp. 633–638, Porto Alegre, Brazil (2014)
Shahid, M.R., Blanc, G., Zhang, Z., Debar, H.: IoT devices recognition through network traffic analysis. In: Proceedings of IEEE ICBD, pp. 5187–5192, USA (2018)
Meidan, Y., et al.: ProfilIoT: a machine learning approach for IoT device identification based on network traffic analysis. In: Proceedings of SAC, pp. 506–509, Morocco (2017)
Meidan, Y., et al.: Detection of unauthorized IoT devices using machine learning techniques (2017). arXiv:1709.04647
Sivanathan, A., et al.: Characterizing and classifying IoT traffic in smart cities and campuses. In: Proceedings of IEEE INFOCOM WKSHPS, pp. 559–564, Atlanta, GA (2017)
Sivanathan, A., et al.: Classifying IoT devices in smart environments using network traffic characteristics. In: Proceedings of IEEE Transactions on Mobile Computing, vol. 18, no. 8, pp. 1745–1759, 1 August 2019
Shafiq, M.Z., Ji, L., Liu, A.X., Pang, J., Wang, J.: Large-scale measurement and characterization of cellular machine-to-machine traffic. In: Proceedings of IEEE/ACM Transactions on Networking, vol. 21, no. 6, pp. 1960–1973, December 2013
Apthorpe, N., Reisman, D., Feamster, N.: A smart home is no castle: privacy vulnerabilities of encrypted IoT traffic (2017). arXiv:1705.06805
Miettinen, M., et al.: IoT sentinel: automated device-type identification for security enforcement in IoT. In: Proceedings of ICDCS, pp. 2177–2184, Atlanta, GA (2017)
Blake, A., David, M.: Identifying encrypted malware traffic with contextual flow data. In: Proceedings of AISec, pp. 35–46 (2016)
Sivanathan, A., Sherratt, D., Gharakheili, H.H., Sivaraman, V., Vishwanath, A.: Low-cost flow-based security solutions for smart-home IoT devices. In: Proceedings of IEEE (ANTS), pp. 1–6, Bangalore (2016)
Ayyoob, H., et al.: Verifying and monitoring IoTs network behavior using MUD profiles. In: Proceedings of IEEE Transactions on Dependable and Secure Computing (2020)
Tang, Y., Zhang, Y.-Q., Huang, Z.: FCM-SVM-RFE gene feature selection algorithm for leukemia classification from microarray gene expression data. In: Proceedings of FUZZ, pp. 97–101, Reno, NV (2005)
Weiss, M., et al.: Time-aware applications, computers, and communication systems. Technical Note (NIST TN) - 1867 (2015)
Peng, L., Yang, B., Chen, Y.: Effective packet number for early stage internet traffic identification. Neurocomput. J. 156(25), 252–267 (2015)
Li, Y., Noseworthy, B., Laird, J., Winters, T., Carlin, T.: A study of precision of hardware time stamping packet traces. In: Proceedings of IEEE ISPCS, pp. 102–107, Austin, TX (2014)
Prasad, A., Iverson, L., Liaw, A.: Newer classification and regression tree techniques: bagging and random forests for ecological prediction. Ecosyst. J. 9, 181–199 (2006)
Thanh Noi, P., Kappas, M.: Comparison of random forest, k-nearest neighbor, and support vector machine classifiers for land cover classification using sentinel-2 imagery. Sens. J. 18(1), 18 (2017)
Linlin, W., Peng, L., Su, M., Yang, B., Zhou, X.: On the impact of packet inter arrival time for early stage traffic identification. In: Proceedings of IEEE iThings and IEEE GreenCom and IEEE CPSCom and IEEE SmartData, pp. 510–515, Chengdu, China (2016)
Qazi, Z.A., et al.: Application-awareness in SDN. In: Proceedings of ACM SIGCOMM, pp. 487–488, NY, USA (2013)
Este, A., Gringoli, F., Salgar elli, L.: On the stability of the information carried by traffic flow features at the packet level. Comput. Commun. Rev. J. 39, 13–18 (2009)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Bassene, A., Gueye, B. (2021). A Group-Based IoT Devices Classification Through Network Traffic Analysis Based on Machine Learning Approach. In: Zitouni, R., Phokeer, A., Chavula, J., Elmokashfi, A., Gueye, A., Benamar, N. (eds) Towards new e-Infrastructure and e-Services for Developing Countries. AFRICOMM 2020. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 361. Springer, Cham. https://doi.org/10.1007/978-3-030-70572-5_12
Download citation
DOI: https://doi.org/10.1007/978-3-030-70572-5_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-70571-8
Online ISBN: 978-3-030-70572-5
eBook Packages: Computer ScienceComputer Science (R0)