skip to main content
10.1145/3266444.3266452acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article
Public Access

Behavioral Fingerprinting of IoT Devices

Published:15 January 2018Publication History

ABSTRACT

The Internet-of-Things (IoT) has brought in new challenges in device identification --what the device is, and authentication --is the device the one it claims to be. Traditionally, the authentication problem is solved by means of a cryptographic protocol. However, the computational complexity of cryptographic protocols and/or problems related to key management, render almost all cryptography based authentication protocols impractical for IoT. The problem of device identification is, on the other hand, sadly neglected. Almost always an artificially created identity is softly associated with the device. We believe that device fingerprinting can be used to solve both these problems effectively. In this work, we present a methodology to perform IoT device behavioral fingerprinting that can be employed to undertake strong device identification. A device behavior is approximated using features extracted from the network traffic of the device. These features are used to train a machine learning model that can be used to detect similar device-types. We validate our approach using five-fold cross validation; we report a identification rate of 93-100 and a mean accuracy of 99%, across all our experiments. Furthermore, we show preliminary results for fingerprinting device categories, i.e., identifying different devices having similar functionality.

References

  1. Chrisil Arackaparambil, Sergey Bratus, Anna Shubina, and David Kotz. 2010. On the Reliability of Wireless Fingerprinting Using Clock Skews. In Proc. of the Third ACM WiSec . ACM, New York, NY, USA, 169--174. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Sergey Bratus, Cory Cornelius, David Kotz, and Daniel Peebles. 2008. Active Behavioral Fingerprinting of Wireless Devices. In Proc. of 1st ACM WiSec (WiSec '08). ACM, New York, NY, USA, 56--61. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Vladimir Brik, Suman Banerjee, Marco Gruteser, and Sangho Oh. 2008. Wireless device identification with radiometric signatures. In Proc. of the 14th ACM MOBICOM . ACM, 116--127. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. David Formby, Preethi Srinivasan, Andrew Leonard, Jonathan Rogers, and Raheem A. Beyah. 2016. Who's in Control of Your Control System? Device Fingerprinting for Cyber-Physical Systems. In 23rd Annual ISOC NDSS .Google ScholarGoogle Scholar
  5. Jé rô me Francc ois, Humberto J. Abdelnur, Radu State, and Olivier Festor. 2009. Automated Behavioral Fingerprinting. In Proc. of the 12th RAID Symposium . 182--201. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Jé rô me Francc ois, Humberto J. Abdelnur, Radu State, and Olivier Festor. 2010. Machine Learning Techniques for Passive Network Inventory. IEEE Trans. Network and Service Management , Vol. 7, 4 (2010), 244--257. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Jason Franklin and Damon McCoy. 2006. Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting. In Proc. of the 15th USENIX Security Symposium, Vancouver, BC, Canada, July 31 - August 4 . Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Jerome H Friedman. 2002. Stochastic Gradient Boosting. Computational Statistics & Data Analysis , Vol. 38, 4 (2002), 367--378. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Ke Gao, Cherita Corbett, and Raheem Beyah. 2010. A passive approach to wireless device fingerprinting. In Proc. of IEEE/IFIP DSN. IEEE, 383--392.Google ScholarGoogle Scholar
  10. John Greenough. 2016. How the "Internet of Things? will impact consumers, businesses, and governments in 2016 and beyond. http://www.businessinsider.com/how-the-internet-of-things-market-will-grow-2014--10?r=DE&IR=T. Last accessed: March 7th, 2018.Google ScholarGoogle Scholar
  11. Suman Jana and Sneha K Kasera. 2010. On fast and accurate detection of unauthorized wireless access points using clock skews. IEEE Trans. on Mobile Computing , Vol. 9, 3 (2010), 449--462. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Amir R Khakpour and Alex X Liu. 2013. An information-theoretical approach to high-speed flow nature identification. IEEE/ACM Trans. on Networking , Vol. 21, 4 (2013), 1076--1089. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Tadayoshi Kohno, Andre Broido, and Kimberly C. Claffy. 2005. Remote Physical Device Fingerprintin. IEEE Trans. Dependable and Secure Computing , Vol. 2, 2 (2005), 93--108. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Brian Krebs. 2017. Mirai IoT Botnet Co-Authors Plead Guilty - Krebs on Security. https://krebsonsecurity.com/tag/mirai-botnet/Google ScholarGoogle Scholar
  15. Andreas Kurtz, Hugo Gascon, Tobias Becker, Konrad Rieck, and Felix Freiling. 2016. Fingerprinting mobile devices using personalized configurations. Proc. on Privacy Enhancing Technologies 1 (2016), 4--19.Google ScholarGoogle ScholarCross RefCross Ref
  16. Rokach Lior. 2014. Data Mining with Decision Trees: Theory and Applications. Vol. 81. World Scientific. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Richard Lippmann, David Fried, Keith Piwowarski, and William Streilein. 2003. Passive operating system identification from TCP/IP packet headers. In Workshop on Data Mining for Computer Security. 40.Google ScholarGoogle Scholar
  18. Alvin Martin, George Doddington, Terri Kamm, Mark Ordowski, and Mark Przybocki. 1997. The DET curve in assessment of detection task performance . Technical Report. National Inst of Standards and Technology Gaithersburg MD.Google ScholarGoogle Scholar
  19. Llew Mason, Jonathan Baxter, Peter L Bartlett, and Marcus R Frean. 2000. Boosting Algorithms as Gradient Descent. In In Proc. of NIPS. 512--518. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Markus Miettinen, Samuel Marchal, Ibbad Hafeez, N. Asokan, Ahmad-Reza Sadeghi, and Sasu Tarkoma. 2017. IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT. In Proc. of 37th IEEE ICDCS . 2177--2184.Google ScholarGoogle Scholar
  21. Jeffrey Pang, Ben Greenstein, Ramakrishna Gummadi, Srinivasan Seshan, and David Wetherall. 2007. 802.11 user fingerprinting. In In Proc. of the 13th ACM MOBICOM. ACM, 99--110. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Fabian Pedregosa, Gaël Varoquaux, Alexandre Gramfort, Vincent Michel, Bertrand Thirion, Olivier Grisel, Mathieu Blondel, Peter Prettenhofer, Ron Weiss, Vincent Dubourg, et almbox. 2011. Scikit-learn: Machine Learning in Python. Journal of Machine Learning Research , Vol. 12, Oct (2011), 2825--2830. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Sakthi Vignesh Radhakrishnan, A. Selcuk Uluagac, and Raheem A. Beyah. 2015. GTID: A Technique for Physical Device and Device Type Fingerprinting. IEEE Trans. Dependable and Secure Computing , Vol. 12, 5 (2015), 519--532.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Senrio. 2016. 400,000 publicly available IoT devices vul- nerable to single flaw. http://blog.senr.io/blog/400000-publicly-available-iot-devices-vulnerable-to-single-flaw. Last accessed: 7th March 2018.Google ScholarGoogle Scholar
  25. Sandra Siby, Rajib Ranjan Maiti, and Nils Tippenhauer. 2017. IoTScanner: Detecting and Classifying Privacy Threats in IoT Neighborhoods. arXiv preprint arXiv:1701.05007 (2017).Google ScholarGoogle Scholar
  26. A. S. Uluagac, S. V. Radhakrishnan, C. Corbett, A. Baca, and R. Beyah. 2013. A passive technique for fingerprinting wireless devices with Wired-side Observations. In Proc. of IEEE CNS. 305--313.Google ScholarGoogle Scholar
  27. Tom Van Goethem, Wout Scheepers, Davy Preuveneers, and Wouter Joosen. 2016. Accelerometer-based device fingerprinting for multi-factor mobile authentication. In Int. Symp. on Engineering Secure Software and Systems. Springer, 106--121. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Behavioral Fingerprinting of IoT Devices

                        Recommendations

                        Comments

                        Login options

                        Check if you have access through your login credentials or your institution to get full access on this article.

                        Sign in

                        PDF Format

                        View or Download as a PDF file.

                        PDF

                        eReader

                        View online with eReader.

                        eReader