Abstract
IoT device identification is an effective security measure to track different devices, helping analyze and defend against potential vulnerabilities of various IoT devices. However, existing IoT device identification works mainly use hand-designed features generated from relevant prior knowledge in the field, resulting in additional labor costs, low efficiency, and loss of some potential features. In addition, most of these works only identify known devices in the training set, without considering unknown devices. In this paper, we propose a quick and efficient IoT device identification method. Our method employs the convolutional neural network and converts raw network traffic into images as the model input, automatically extracting features from images instead of manually extracting features. Our method can identifies device types including unknown device types, and detects abnormal traffic of devices. We achieve over 98% accuracy on public datasets with few time consume, demonstrating the accuracy and practicality of our method.
Similar content being viewed by others
References
State of IoT 2022: Number of Connected IoT Devices Growing 18% to 14.4 Billion Globally. https://iot-analytics.com/number-connected-iot-devices
Antonakakis, M., April, T., Bailey, M., Bernhard, M., Bursztein, E., Cochran, J., Durumeric, Z., Halderman, J. A., Invernizzi, L., & Kallitsis, M. (2017). Understanding the Mirai Botnet. In: 26th USENIX security symposium (USENIX Security 17), pp. 1093–1110.
Cisco: Cisco 2017 Midyear Cybersecurity Report. https://www.cisco.com/c/dam/global/es_mx/solutions/security/pdf/cisco-2017-midyear-cybersecurity-report.pdf
Andrea, I., Chrysostomou, C., & Hadjichristofi, G. (2015). Internet of Things: Security vulnerabilities and challenges. In: 2015 IEEE symposium on computers and communication (ISCC), pp. 180–187. IEEE
Kolias, C., Kambourakis, G., Stavrou, A., & Voas, J. (2017). DDoS in the IoT: Mirai and other botnets. Computer, 50(7), 80–84.
Mirai Botnet Attack IoT Devices Via CVE-2020-5902. https://www.trendmicro.com/en_us/research/20/g/mirai-botnet-attack-iot-devices-via-cve-2020-5902.html
Liu, Y., Wang, J., Li, J., Niu, S., & Song, H. (2021). Machine learning for the detection and identification of internet of things devices: A survey. IEEE Internet of Things Journal, 9(1), 298–320.
Wang, W., Lai, Q., Fu, H., Shen, J., Ling, H., & Yang, R. (2021). Salient object detection in the deep learning era: An in-depth survey. IEEE Transactions on Pattern Analysis and Machine Intelligence, 44(6), 3239–3259.
Lavanya, P., & Sasikala, E. (2021). Deep learning techniques on text classification using natural language processing (NLP) in social healthcare network: A comprehensive survey. In: 2021 3rd international conference on signal processing and communication (ICPSC), pp. 603–609. IEEE
Pang, G., Shen, C., Cao, L., & Hengel, A. V. D. (2021). Deep learning for anomaly detection: A review. ACM Computing Surveys (CSUR), 54(2), 1–38.
Minaee, S., Boykov, Y. Y., Porikli, F., Plaza, A. J., Kehtarnavaz, N., & Terzopoulos, D. (2021). Image segmentation using deep learning: A survey. IEEE Transactions on Pattern Analysis and Machine Intelligence.
Zhao, Y., Xun, Y., & Liu, J. (2022). ClockIDS: A real-time vehicle intrusion detection system based on clock skew. IEEE Internet of Things Journal.
Jian, T., Gong, Y., Zhan, Z., Shi, R., Soltani, N., Wang, Z., Dy, J., Chowdhury, K., Wang, Y., & Ioannidis, S. (2021). Radio frequency fingerprinting on the edge. IEEE Transactions on Mobile Computing, 21(11), 4078–4093.
Baldini, G., Giuliani, R., Steri, G., Sanchez, I., & Gentile, C. (2017). The application of the Symbolic Aggregate Approximation algorithm (SAX) to radio frequency fingerprinting of IoT devices. In: 2017 IEEE symposium on communications and vehicular technology (SCVT), pp. 1–6 . IEEE
Luo, Y., Hu, H., Wen, Y., & Tao, D. (2020). Transforming device fingerprinting for wireless security via online multitask metric learning. IEEE Internet of Things Journal, 7(1), 208–219.
Dorri, A., Roulin, C., Pal, S., Baalbaki, S., Jurdak, R., & Kanhere, S.S. (2022). Device Identification in Blockchain-based internet of things. IEEE Internet of Things Journal.
Dev, K., Khowaja, S. A., Sharma, P. K., Chowdhry, B. S., Tanwar, S., & Fortino, G. (2022). DDI: A novel architecture for joint active user detection and IoT device identification in grant-free NOMA systems for 6G and beyond networks. IEEE Internet of Things Journal, 9(4), 2906–2917.
Sivanathan, A., Gharakheili, H. H., Loi, F., Radford, A., Wijenayake, C., Vishwanath, A., & Sivaraman, V. (2018). Classifying IoT devices in smart environments using network traffic characteristics. IEEE Transactions on Mobile Computing, 18(8), 1745–1759.
Miettinen, M., Marchal, S., Hafeez, I., Asokan, N., Sadeghi, A.-R., & Tarkoma, S. (2017). IoT SENTINEL: Automated device-type identification for security enforcement in IoT. In: 2017 IEEE 37th international conference on distributed computing systems (ICDCS), pp. 2177–2184 . IEEE
Marchal, S., Miettinen, M., Nguyen, T. D., Sadeghi, A.-R., & Asokan, N. (2019). AuDI: Toward autonomous IoT device-type identification using periodic communication. IEEE Journal on Selected Areas in Communications, 37(6), 1402–1412.
Charyyev, B., & Gunes, M. H. (2020). Locality-sensitive IoT network traffic fingerprinting for device identification. IEEE Internet of Things Journal, 8(3), 1272–1281.
Aksoy, A., & Gunes, M. H. (2019). Automated IoT device identification using network traffic. In: ICC 2019-2019 IEEE international conference on communications (ICC), pp. 1–7. IEEE
Hui, S., Wang, H., Xu, D., Wu, J., Li, Y., & Jin, D. (2021). Distinguishing between smartphones and IoT devices via network traffic. IEEE Internet of Things Journal, 9(2), 1182–1196.
Meidan, Y., Bohadana, M., Shabtai, A., Guarnizo, J. D., Ochoa, M., Tippenhauer, N. O., & Elovici, Y. (2017). ProfilIoT: A machine learning approach for IoT device identification based on network traffic analysis. In: Proceedings of the symposium on applied computing, pp. 506–509
Sivanathan, A., Gharakheili, H. H., & Sivaraman, V. (2020). Managing IoT cyber-security using programmable telemetry and machine learning. IEEE Transactions on Network and Service Management, 17(1), 60–74.
Dainotti, A., Pescape, A., & Claffy, K. C. (2012). Issues and future directions in traffic classification. IEEE network, 26(1), 35–40.
Odena, A., Olah, C., & Shlens, J. (2017). Conditional image synthesis with auxiliary classifier GANs. In: International conference on machine learning, pp. 2642–2651. PMLR
Goodfellow, I., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., Courville, A., & Bengio, Y. (2020). Generative adversarial networks. Communications of the ACM, 63(11), 139–144.
Schroff, F., Kalenichenko, D., & Philbin, J. (2015). Facenet: A unified embedding for face recognition and clustering. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 815–823 .
Funding
This work was supported in part by the Shenzhen Colleges and Universities Stable Support Program No. GXWD20220817124251002, the Joint Funds of the National Natural Science Foundation of China (Grant No. U22A2036), the Fundamental Research Funds for the Central Universities under Grant HIT.OCEF.2021007, the Shenzhen Science and Technology Research and Development Fundation No. JCYJ20190806143418198, and the Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies (2022B1212010005).
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no known competing interests or personal relationships that could have appeared to influence the work reported in this paper.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Yin, S., Zhang, W., Feng, Y. et al. Automatic IoT device identification: a deep learning based approach using graphic traffic characteristics. Telecommun Syst 83, 101–114 (2023). https://doi.org/10.1007/s11235-023-01009-1
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11235-023-01009-1