Skip to main content

IPAssess: A Protocol-Based Fingerprinting Model for Device Identification in the IoT

  • Conference paper
  • First Online:
Intelligent Systems and Applications (IntelliSys 2023)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 824))

Included in the following conference series:

  • 413 Accesses

Abstract

The Internet of Things (IoT) has become a widely prevalent concept as it has dramatically advanced the ability to communicate and exchange data between various connected devices. With its success and growing need, many threats and attacks against IoT devices and services have exponentially increased. An increase in knowledge of IoT-related threats and adequate monitoring technologies have helped develop the potential to detect the threats. There have been various studies on fingerprinting based approaches on device identification but none have taken into account the full protocol spectrum. IPAssess is a novel fingerprinting based model which takes a feature set based on the correlation between the device characteristics and the protocols and then applies various machine learning algorithms: Random Forest, Decision Tree, K-Nearest Neighbour (KNN), Naive Bayes, and Gradient Boost (XGB), to perform device identification and classification. We have used aggregation and augmentation to enhance the algorithm. In our experimental study, IPAssess performs IoT device identification with a 99.6% classification accuracy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Agarwal, S., Oser, P., Lueders, S.: Detecting IoT devices and how they put large heterogeneous networks at security risk. Sensors 19(19), 4107 (2019)

    Article  Google Scholar 

  2. Aksoy, A., Gunes, M.H.: Automated iot device identification using network traffic. In: ICC 2019-2019 IEEE International Conference on Communications (ICC), pp. 1–7. IEEE (2019)

    Google Scholar 

  3. Alrashdi, I., Alqazzaz, A., Aloufi, E., Alharthi, R., Zohdy, M., Ming, H.: Ad-iot: Anomaly detection of iot cyberattacks in smart city using machine learning. In: 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC), pp. 0305–0310. IEEE (2019)

    Google Scholar 

  4. Ganeriwala, P., Bhattacharyya, S., Muthalagu, R., Nandanwar, S., Gupta, A.: A Protocol-Based Fingerprinting Model for Device Identification in the IoT. IPAssess (2021)

    Google Scholar 

  5. Bai, L., Yao, L., Kanhere, S.S., Wang, X., Yang, Z.: Automatic device classification from network traffic streams of internet of things. In: 2018 IEEE 43rd Conference on Local Computer Networks (LCN), pp. 1–9. IEEE (2018)

    Google Scholar 

  6. Bezawada, B., Bachani, M., Peterson, J., Shirazi, H., Ray, I., Ray, I.: Iotsense: Behavioral fingerprinting of iot devices (2018). arXiv:1804.03852

  7. Chowdhury, R.R., Aneja, S., Aneja, N., Abas, E.: Network traffic analysis based iot device identification. In: Proceedings of the 2020 the 4th International Conference on Big Data and Internet of Things, pp. 79–89 (2020)

    Google Scholar 

  8. Ruizhong, D., Wang, J., Li, S.: A lightweight flow feature-based iot device identification scheme. Secur. Commun. Netw. 8486080(1), 2022 (2022)

    Google Scholar 

  9. Jing, Q., Vasilakos, A., Wan, J., Lu, J., Qiu, D.: Security of the internet of things: perspectives and challenges. Wirel. Netw. 20, 2481–2501 (2014)

    Google Scholar 

  10. Kostas, K., Just, M., Lones, M.A.: IoTDevID: a behavior-based fingerprinting method for device identification in the IoT (2021). arXiv:2102.08866

  11. Kotak, J., Elovici, Y.: Iot device identification based on network communication analysis using deep learning. J. Ambient. Intell. Humaniz. Comput. 9 (2022)

    Google Scholar 

  12. Mavrogiorgou, A., Kiourtis, A., Kyriazis, D.: Iot devices recognition through object detection and classification techniques. In: 2019 Third World Conference on Smart Trends in Systems Security and Sustainability (WorldS4), pp. 12–20. IEEE (2019)

    Google Scholar 

  13. Meidan, Y., Bohadana, M., Shabtai, A., Guarnizo, J.D., Ochoa, M., Tippenhauer, N.O., Elovici, Y.: ProfilioT: a machine learning approach for IoT device identification based on network traffic analysis. In: Proceedings of the Symposium on Applied Computing, pp. 506–509 (2017)

    Google Scholar 

  14. Miettinen, M., Marchal, S., Hafeez, I., Asokan, N., Sadeghi, A.-R., Tarkoma, S.: Iot sentinel: automated device-type identification for security enforcement in iot. In: 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), pp. 2177–2184. IEEE (2017)

    Google Scholar 

  15. Miller, F.P., Vandome, A.F., McBrewster, J.: Levenshtein distance: information theory, computer science, string (computer science), string metric, damerau? levenshtein distance, spell checker, hamming distance (2009)

    Google Scholar 

  16. Pinheiro, A.J., de Bezerra, J.M., Burgardt, C.A.P., Campelo, D.R.: Identifying iot devices and events based on packet length from encrypted traffic. Comput. Commun. 144, 8–17 (2019)

    Google Scholar 

  17. Salman, O., Elhajj, I.H., Chehab, A., Kayssi, A.: A machine learning based framework for iot device identification and abnormal traffic detection. Trans. Emerg. Telecommun. Technol. 33(3), e3743 (2022). ETT-19-0273.R1

    Google Scholar 

  18. Shafiq, M., Tian, Z., Sun, Y., Xiaojiang, D., Guizani, M.: Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for internet of things in smart city. Futur. Gener. Comput. Syst. 107, 433–442 (2020)

    Article  Google Scholar 

  19. Shahid, M.R., Blanc, G., Zhang, Z., Debar, H.: Iot devices recognition through network traffic analysis. In: 2018 IEEE International Conference on Big Data (Big Data), pp. 5187–5192. IEEE (2018)

    Google Scholar 

  20. Sivanathan, A., Gharakheili, H.H., Sivaraman, V.: Managing iot cyber-security using programmable telemetry and machine learning. IEEE Trans. Netw. Serv. Manag. 17(1), 60–74 (2020)

    Google Scholar 

  21. Thom, J., Thom, N., Sengupta, S., Hand, E.: Smart recon: network traffic fingerprinting for iot device identification. In: 2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC), pp. 0072–0079 (2022)

    Google Scholar 

  22. Wang, Y., Rimal, B.P., Elder, M., Maldonado, S.I.C., Chen, H., Koball, C., Ragothaman, K.: Iot device identification using supervised machine learning. In: 2022 IEEE International Conference on Consumer Electronics (ICCE), pp. 1–6 (2022)

    Google Scholar 

  23. Yang, K., Li, Q., Sun, L.: Towards automatic fingerprinting of iot devices in the cyberspace. Comput. Netw. 148, 318–327 (2019)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Parth Ganeriwala .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ganeriwala, P., Bhattacharyya, S., Muthalagu, R., Nandanwar, S., Gupta, A. (2024). IPAssess: A Protocol-Based Fingerprinting Model for Device Identification in the IoT. In: Arai, K. (eds) Intelligent Systems and Applications. IntelliSys 2023. Lecture Notes in Networks and Systems, vol 824. Springer, Cham. https://doi.org/10.1007/978-3-031-47715-7_46

Download citation

Publish with us

Policies and ethics