Skip to main content
Log in

Automatic IoT device identification: a deep learning based approach using graphic traffic characteristics

  • Published:
Telecommunication Systems Aims and scope Submit manuscript

Abstract

IoT device identification is an effective security measure to track different devices, helping analyze and defend against potential vulnerabilities of various IoT devices. However, existing IoT device identification works mainly use hand-designed features generated from relevant prior knowledge in the field, resulting in additional labor costs, low efficiency, and loss of some potential features. In addition, most of these works only identify known devices in the training set, without considering unknown devices. In this paper, we propose a quick and efficient IoT device identification method. Our method employs the convolutional neural network and converts raw network traffic into images as the model input, automatically extracting features from images instead of manually extracting features. Our method can identifies device types including unknown device types, and detects abnormal traffic of devices. We achieve over 98% accuracy on public datasets with few time consume, demonstrating the accuracy and practicality of our method.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

References

  1. State of IoT 2022: Number of Connected IoT Devices Growing 18% to 14.4 Billion Globally. https://iot-analytics.com/number-connected-iot-devices

  2. Antonakakis, M., April, T., Bailey, M., Bernhard, M., Bursztein, E., Cochran, J., Durumeric, Z., Halderman, J. A., Invernizzi, L., & Kallitsis, M. (2017). Understanding the Mirai Botnet. In: 26th USENIX security symposium (USENIX Security 17), pp. 1093–1110.

  3. Cisco: Cisco 2017 Midyear Cybersecurity Report. https://www.cisco.com/c/dam/global/es_mx/solutions/security/pdf/cisco-2017-midyear-cybersecurity-report.pdf

  4. Andrea, I., Chrysostomou, C., & Hadjichristofi, G. (2015). Internet of Things: Security vulnerabilities and challenges. In: 2015 IEEE symposium on computers and communication (ISCC), pp. 180–187. IEEE

  5. Kolias, C., Kambourakis, G., Stavrou, A., & Voas, J. (2017). DDoS in the IoT: Mirai and other botnets. Computer, 50(7), 80–84.

    Article  Google Scholar 

  6. Mirai Botnet Attack IoT Devices Via CVE-2020-5902. https://www.trendmicro.com/en_us/research/20/g/mirai-botnet-attack-iot-devices-via-cve-2020-5902.html

  7. Liu, Y., Wang, J., Li, J., Niu, S., & Song, H. (2021). Machine learning for the detection and identification of internet of things devices: A survey. IEEE Internet of Things Journal, 9(1), 298–320.

    Article  Google Scholar 

  8. Wang, W., Lai, Q., Fu, H., Shen, J., Ling, H., & Yang, R. (2021). Salient object detection in the deep learning era: An in-depth survey. IEEE Transactions on Pattern Analysis and Machine Intelligence, 44(6), 3239–3259.

    Article  Google Scholar 

  9. Lavanya, P., & Sasikala, E. (2021). Deep learning techniques on text classification using natural language processing (NLP) in social healthcare network: A comprehensive survey. In: 2021 3rd international conference on signal processing and communication (ICPSC), pp. 603–609. IEEE

  10. Pang, G., Shen, C., Cao, L., & Hengel, A. V. D. (2021). Deep learning for anomaly detection: A review. ACM Computing Surveys (CSUR), 54(2), 1–38.

    Article  Google Scholar 

  11. Minaee, S., Boykov, Y. Y., Porikli, F., Plaza, A. J., Kehtarnavaz, N., & Terzopoulos, D. (2021). Image segmentation using deep learning: A survey. IEEE Transactions on Pattern Analysis and Machine Intelligence.

  12. Zhao, Y., Xun, Y., & Liu, J. (2022). ClockIDS: A real-time vehicle intrusion detection system based on clock skew. IEEE Internet of Things Journal.

  13. Jian, T., Gong, Y., Zhan, Z., Shi, R., Soltani, N., Wang, Z., Dy, J., Chowdhury, K., Wang, Y., & Ioannidis, S. (2021). Radio frequency fingerprinting on the edge. IEEE Transactions on Mobile Computing, 21(11), 4078–4093.

    Article  Google Scholar 

  14. Baldini, G., Giuliani, R., Steri, G., Sanchez, I., & Gentile, C. (2017). The application of the Symbolic Aggregate Approximation algorithm (SAX) to radio frequency fingerprinting of IoT devices. In: 2017 IEEE symposium on communications and vehicular technology (SCVT), pp. 1–6 . IEEE

  15. Luo, Y., Hu, H., Wen, Y., & Tao, D. (2020). Transforming device fingerprinting for wireless security via online multitask metric learning. IEEE Internet of Things Journal, 7(1), 208–219.

    Article  Google Scholar 

  16. Dorri, A., Roulin, C., Pal, S., Baalbaki, S., Jurdak, R., & Kanhere, S.S. (2022). Device Identification in Blockchain-based internet of things. IEEE Internet of Things Journal.

  17. Dev, K., Khowaja, S. A., Sharma, P. K., Chowdhry, B. S., Tanwar, S., & Fortino, G. (2022). DDI: A novel architecture for joint active user detection and IoT device identification in grant-free NOMA systems for 6G and beyond networks. IEEE Internet of Things Journal, 9(4), 2906–2917.

    Article  Google Scholar 

  18. Sivanathan, A., Gharakheili, H. H., Loi, F., Radford, A., Wijenayake, C., Vishwanath, A., & Sivaraman, V. (2018). Classifying IoT devices in smart environments using network traffic characteristics. IEEE Transactions on Mobile Computing, 18(8), 1745–1759.

    Article  Google Scholar 

  19. Miettinen, M., Marchal, S., Hafeez, I., Asokan, N., Sadeghi, A.-R., & Tarkoma, S. (2017). IoT SENTINEL: Automated device-type identification for security enforcement in IoT. In: 2017 IEEE 37th international conference on distributed computing systems (ICDCS), pp. 2177–2184 . IEEE

  20. Marchal, S., Miettinen, M., Nguyen, T. D., Sadeghi, A.-R., & Asokan, N. (2019). AuDI: Toward autonomous IoT device-type identification using periodic communication. IEEE Journal on Selected Areas in Communications, 37(6), 1402–1412.

    Article  Google Scholar 

  21. Charyyev, B., & Gunes, M. H. (2020). Locality-sensitive IoT network traffic fingerprinting for device identification. IEEE Internet of Things Journal, 8(3), 1272–1281.

    Article  Google Scholar 

  22. Aksoy, A., & Gunes, M. H. (2019). Automated IoT device identification using network traffic. In: ICC 2019-2019 IEEE international conference on communications (ICC), pp. 1–7. IEEE

  23. Hui, S., Wang, H., Xu, D., Wu, J., Li, Y., & Jin, D. (2021). Distinguishing between smartphones and IoT devices via network traffic. IEEE Internet of Things Journal, 9(2), 1182–1196.

    Article  Google Scholar 

  24. Meidan, Y., Bohadana, M., Shabtai, A., Guarnizo, J. D., Ochoa, M., Tippenhauer, N. O., & Elovici, Y. (2017). ProfilIoT: A machine learning approach for IoT device identification based on network traffic analysis. In: Proceedings of the symposium on applied computing, pp. 506–509

  25. Sivanathan, A., Gharakheili, H. H., & Sivaraman, V. (2020). Managing IoT cyber-security using programmable telemetry and machine learning. IEEE Transactions on Network and Service Management, 17(1), 60–74.

    Article  Google Scholar 

  26. Dainotti, A., Pescape, A., & Claffy, K. C. (2012). Issues and future directions in traffic classification. IEEE network, 26(1), 35–40.

    Article  Google Scholar 

  27. Odena, A., Olah, C., & Shlens, J. (2017). Conditional image synthesis with auxiliary classifier GANs. In: International conference on machine learning, pp. 2642–2651. PMLR

  28. Goodfellow, I., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., Courville, A., & Bengio, Y. (2020). Generative adversarial networks. Communications of the ACM, 63(11), 139–144.

    Article  Google Scholar 

  29. Schroff, F., Kalenichenko, D., & Philbin, J. (2015). Facenet: A unified embedding for face recognition and clustering. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 815–823 .

Download references

Funding

This work was supported in part by the Shenzhen Colleges and Universities Stable Support Program No. GXWD20220817124251002, the Joint Funds of the National Natural Science Foundation of China (Grant No. U22A2036), the Fundamental Research Funds for the Central Universities under Grant HIT.OCEF.2021007, the Shenzhen Science and Technology Research and Development Fundation No. JCYJ20190806143418198, and the Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies (2022B1212010005).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Weizhe Zhang.

Ethics declarations

Conflict of interest

The authors declare that they have no known competing interests or personal relationships that could have appeared to influence the work reported in this paper.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yin, S., Zhang, W., Feng, Y. et al. Automatic IoT device identification: a deep learning based approach using graphic traffic characteristics. Telecommun Syst 83, 101–114 (2023). https://doi.org/10.1007/s11235-023-01009-1

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11235-023-01009-1

Keywords

Navigation