A Network Device Identification Method Based on Packet Temporal Features and Machine Learning
-
Published:2024-09-06
Issue:17
Volume:14
Page:7954
-
ISSN:2076-3417
-
Container-title:Applied Sciences
-
language:en
-
Short-container-title:Applied Sciences
Author:
Hu Lin1ORCID, Zhao Baoqi2, Wang Guangji3
Affiliation:
1. Department of Electronic Information and Electrical Engineering, Chengdu University, Chengdu 610106, China 2. Shenzhen Institute for Advanced Study, UESTC, Shenzhen 518000, China 3. Zhejiang Guo Fu Environmental Technology Co., Ltd., Hangzhou 310012, China
Abstract
With the rapid development of the Internet of Things (IoT) technology, the number and types of devices accessing the Internet are increasing, leading to increased network security problems such as hacker attacks and botnets. Usually, these attacks are related to the type of device, and the risk can be effectively reduced if the type of network device can be efficiently identified and controlled. The traditional network device identification method uses active detection technology to obtain information about the device and match it with a manually defined fingerprint database to achieve network device identification. This method impacts the smoothness of the network and requires the manual establishment of fingerprint libraries, which imposes a large labor cost but only achieves a low identification efficiency. The traditional machine learning method only considers the information of individual packets; it does not consider the timing relationship between packets, and the recognition effect is poor. Based on the above research, in this paper, we considered the packet temporal relationship, proposed the TCN model of the Inception structure, extracted the packet temporal relationship, and designed a multi-head self-attention mechanism to fuse the features to generate device fingerprints for device identification. Experiments were conducted on the publicly available UNSW dataset, and the results showed that this method achieved notable improvements compared to the traditional machine learning method, with F1 reaching 96.76%.
Reference20 articles.
1. The effect of iot new features on security and privacy: New threats, existing solutions, and challenges yet to be solved;Zhou;IEEE Internet Things,2019 2. Feng, X., Li, Q., Wang, H., and Sun, L. (2016, January 8–11). Characterizing industrial control system devices on the internet. Proceedings of the IEEE 24th International Conference on Network Protocols (ICNP), Singapore. 3. Miettinen, M., Marchal, S., Hafeez, I., Asokan, N., Sadeghi, A.R., and Tarkoma, S. (2017, January 5–8). Iot sentinel: Automated device-type identification for security enforcement in iot. Proceedings of the IEEE 37th International Conference on Distributed Computing Systems (ICDCS), Atlanta, GA, USA. 4. Bezawada, B., Bachani, M., Peterson, J., Shirazi, H., and Ray, I. (2018, January 15–19). Behavioral fingerprinting of iot devices. Proceedings of the Workshop on Attacks and Solutions in Hardware Security, Toronto, ON, Canada. 5. IoTDevID: A Behavior-Based Device Identification Method for the IoT;Kostas;IEEE Internet Things,2019
|
|