Affiliation:
1. College of Software, Taiyuan University of Technology, Taiyuan 030024, China
2. College of Computer Science and Technology, Taiyuan University of Technology, Taiyuan 030024, China
Abstract
With the development of 5G, the number of IoT (Internet of Things) devices connected to the Internet will grow explosively. However, due to the vulnerability of the devices, attackers can launch attacks on the vulnerable IoT devices, causing great impact on the security of the network environment. Fine-grained identification of IoT devices can help network administrators set up appropriate security policies based on the functionality and heterogeneity of the devices, while enabling timely updates and upgrades for devices with security vulnerabilities or the isolation of these dangerous devices. However, most of the existing IoT device identification methods rely on a priori knowledge or expert experience in selecting features, which cannot weigh the identification performance and labor cost. In this paper, we design a fine-grained identification method for IoT devices based on causal inference, which automatically extracts key features in the protocol fields of device communication from the perspective of causality and then classifies key features using a Stacking integrated learning method to achieve high-precision and fine-grained device identification. Through experimental verification, the proposed method achieves 96.3% and 97.7% device model identification accuracy under HTTP/TCP and SSH/TCP protocol clusters.
Funder
Fundamental Research Program of Shanxi Province
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Hardware and Architecture,Signal Processing,Control and Systems Engineering
Reference33 articles.
1. Pacheco, J., and Hariri, S. (2016, January 12–16). IoT security framework for smart cyber infrastructures. Proceedings of the 2016 IEEE 1st International Workshops on Foundations and Applications of Self* Systems (FAS* W), Augsburg, Germany.
2. A framework for searching Internet-wide devices;Li;IEEE Netw.,2017
3. (2023, May 25). Shodan Search Engine. Available online: https://shodan.io/.
4. Nmap: A novel neighborhood preservation space-filling algorithm;Duarte;IEEE Trans. Vis. Comput. Graph.,2014
5. Spirtes, P., Glymour, C.N., and Scheines, R. (2000). Causation, Prediction and Search, MIT Press.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献