skip to main content
10.1145/3019612.3019878acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
research-article
Open Access

ProfilIoT: a machine learning approach for IoT device identification based on network traffic analysis

Authors Info & Claims
Published:03 April 2017Publication History

ABSTRACT

In this work we apply machine learning algorithms on network traffic data for accurate identification of IoT devices connected to a network. To train and evaluate the classifier, we collected and labeled network traffic data from nine distinct IoT devices, and PCs and smartphones. Using supervised learning, we trained a multi-stage meta classifier; in the first stage, the classifier can distinguish between traffic generated by IoT and non-IoT devices. In the second stage, each IoT device is associated a specific IoT device class. The overall IoT classification accuracy of our model is 99.281+.

References

  1. Alexa top sites. Retrieved April 14, 2016 from http://www.alexa.com/topsites.Google ScholarGoogle Scholar
  2. Geoip lookup service. Retrieved April 14, 2016 from http://geoip.com/.Google ScholarGoogle Scholar
  3. D. Bekerman. Network features. Retrieved April 14, 2016 from http://www.ise.bgu.ac.il/dima/network_traffic_features_set.pdf.Google ScholarGoogle Scholar
  4. D. Bekerman, B. Shapira, L. Rokach, and A. Bar. Unknown malware detection using network traffic classification. In Proc. of IEEE Conference on Communications and Network Security (CNS), 2015. Google ScholarGoogle ScholarCross RefCross Ref
  5. V. Brik, S. Banerjee, M. Gruteser, and S. Oh. Wireless device identification with radiometric signatures. In Proc. of ACM conference on Mobile computing and networking, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. G. Combs et al. Wireshark-network protocol analyzer. Version 0.99, 5, 2008.Google ScholarGoogle Scholar
  7. G. Gu, R. Perdisci, J. Zhang, and W. Lee. BotMiner: Clustering analysis of network traffic for protocol-and structure-independent botnet detection. In Proc. of USENIX Security Symposium, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. P. N. Mahalle, N. R. Prasad, and R. Prasad. Object classification based context management for identity management in internet of things. International Journal of Computer Applications, 63(12), 2013.Google ScholarGoogle ScholarCross RefCross Ref
  9. D. Miorandi, S. Sicari, F. De Pellegrini, and I. Chlamtac. Internet of Things: Vision, applications and research challenges. Ad Hoc Networks, 10(7):1497--1516, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. I. H. Saruhan. Detecting and preventing rogue devices on the network. SANS Institute InfoSec Reading Room, sans. org, 2007.Google ScholarGoogle Scholar
  11. W. T. Strayer, D. Lapsely, R. Walsh, and C. Livadas. Botnet detection based on network behavior. In Botnet Detection: Countering the Largest Security Threat, pages 1--24. Springer, 2008. Google ScholarGoogle ScholarCross RefCross Ref
  12. K. I. Talbot, P. R. Duley, and M. H. Hyatt. Specific emitter identification and verification. Technology Review, page 113, 2003.Google ScholarGoogle Scholar

Index Terms

  1. ProfilIoT: a machine learning approach for IoT device identification based on network traffic analysis

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        SAC '17: Proceedings of the Symposium on Applied Computing
        April 2017
        2004 pages
        ISBN:9781450344869
        DOI:10.1145/3019612

        Copyright © 2017 Owner/Author

        Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 3 April 2017

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate1,650of6,669submissions,25%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader