Abstract
Now Internet of Things is growing fast and presents huge opportunities for the industry, the users, and the hackers. IoT service providers may face challenges from IoT devices which are developed with software and hardware originally designed for mobile computing and traditional computer environments. Thus the first line of security defense of IoT service providers is identification of IoT devices and try to analyze their behaviors before allowing them to use the service. In this work, we propose to use machine learning techniques to identify the IoT devices. We also report experiment to explain the performance and potential of our techniques.
The work is supported by (1) project “IoT Testing Service Platform” by the Cybersecurity Technology Institute, Institute for Information Industry, 2018, (2) project “Coverage Testing Technology based on Game Theory” by Research Center for Information Technology Innovation, Academia Sinica, 2018, and (3) project “Cloud Client-Server Computing of Intelligent Test Service” (MOST 107-2221-E-002-037-MY3) by Ministry of Science and Technology.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bodenheim, R., Butts, J., Dunlap, S., Mullins, B.: Evaluation of the ability of the shodan search engine to identify internet-facing industrial control devices. Int. J. Crit. Infrastruct. Prot. 7(2), 114–123 (2014)
Brik, V., Banerjee, S., Gruteser, M., Oh, S.: Wireless device identification with radiometric signatures. In: ACM Conference on Mobile Computing and Networking (2008)
Bekerman, D., Shapira, B., Rokach, L., Bar, A.: Unknown malware detection using network traffic classification. In: IEEE Conference on Communications and Network Security (CNS) (2015)
Genge, B., Enăchescu, C.: ShoVAT: Shodan-based vulnerability assessment tool for Internet- facing services. Secur. Commun. Netw. 9(15), 2696–2714 (2015)
Goldman, D.: Shodan: The Scariest Search Engine on the Internet, February 2014. http://money.cnn.com/2013/04/08/technology/security/shodan/
Gu, G., Perdisci, R., Zhang, J., Lee, W.: BotMiner: clustering analysis of network traffic for protocol-and-structure-independent botnet detection. In: USENIX Security Symposium (2008)
Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., Zhao, W.: A survey on internet of things: architecture, enabling technologies, security and privacy, and applications. IEEE Internet Things J. 4(5), 1125–1142 (2017)
Meunier, F., et al.: The ‘Internet of Things’ Is Now: Connecting the Real Economy, 10 April 2015. www.morganstanley.com/what-we-do/research
Meidan, Y., et al.: ProfilloT: a machine learning approach for IoT device identification based on network traffic analysis. In: ACM Symposium on Applied Computing (SAC) (2017)
Reenskaug, T.: The orginal MVC reports. Department of Informatics, University of Oslo. http://heim.ifi.uio.no/~trygver/2007/MVC_Originals.pdf
Strayer, W.T., Lapsely, D., Walsh, R., Livadas, C.: Botnet detection based on network behavior. In: Lee, W., Wang, C., Dagon, D. (eds) Botnet Detection. Advances in Information Security, vol. 36, pp. 1–24. Springer, Boston (2008). https://doi.org/10.1007/978-0-387-68768-1_1
Simon, K.: Vulnerability analysis using google and shodan. In: Foresti, S., Persiano, G. (eds) Cryptology and Network Security. CANS 2016. LNCS, vol. 10052. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-48965-0_51
Talbot, K.I., Duley, P.R., Hyatt, D.H.: Specific emitter identification and verification. Technol. Rev., 113 (2003)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Lin, Y.C., Wang, F. (2019). Machine Learning Techniques for Recognizing IoT Devices. In: Chang, CY., Lin, CC., Lin, HH. (eds) New Trends in Computer Technologies and Applications. ICS 2018. Communications in Computer and Information Science, vol 1013. Springer, Singapore. https://doi.org/10.1007/978-981-13-9190-3_74
Download citation
DOI: https://doi.org/10.1007/978-981-13-9190-3_74
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-9189-7
Online ISBN: 978-981-13-9190-3
eBook Packages: Computer ScienceComputer Science (R0)