Position paper: A systematic framework for categorising IoT device fingerprinting mechanisms
The popularity of the Internet of Things (IoT) devices makes it increasingly important to be able to fingerprint them, for example in order to detect if there are misbehaving or even malicious IoT devices in one's network. The aim of this paper is to provide a systematic categorisation of machi...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Journal Article |
Language: | English |
Published: |
16-10-2020
|
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Abstract | The popularity of the Internet of Things (IoT) devices makes it increasingly
important to be able to fingerprint them, for example in order to detect if
there are misbehaving or even malicious IoT devices in one's network. The aim
of this paper is to provide a systematic categorisation of machine learning
augmented techniques that can be used for fingerprinting IoT devices. This can
serve as a baseline for comparing various IoT fingerprinting mechanisms, so
that network administrators can choose one or more mechanisms that are
appropriate for monitoring and maintaining their network. We carried out an
extensive literature review of existing papers on fingerprinting IoT devices --
paying close attention to those with machine learning features. This is
followed by an extraction of important and comparable features among the
mechanisms outlined in those papers. As a result, we came up with a key set of
terminologies that are relevant both in the fingerprinting context and in the
IoT domain. This enabled us to construct a framework called IDWork, which can
be used for categorising existing IoT fingerprinting mechanisms in a way that
will facilitate a coherent and fair comparison of these mechanisms. We found
that the majority of the IoT fingerprinting mechanisms take a passive approach
-- mainly through network sniffing -- instead of being intrusive and
interactive with the device of interest. Additionally, a significant number of
the surveyed mechanisms employ both static and dynamic approaches, in order to
benefit from complementary features that can be more robust against certain
attacks such as spoofing and replay attacks. |
---|---|
AbstractList | The popularity of the Internet of Things (IoT) devices makes it increasingly
important to be able to fingerprint them, for example in order to detect if
there are misbehaving or even malicious IoT devices in one's network. The aim
of this paper is to provide a systematic categorisation of machine learning
augmented techniques that can be used for fingerprinting IoT devices. This can
serve as a baseline for comparing various IoT fingerprinting mechanisms, so
that network administrators can choose one or more mechanisms that are
appropriate for monitoring and maintaining their network. We carried out an
extensive literature review of existing papers on fingerprinting IoT devices --
paying close attention to those with machine learning features. This is
followed by an extraction of important and comparable features among the
mechanisms outlined in those papers. As a result, we came up with a key set of
terminologies that are relevant both in the fingerprinting context and in the
IoT domain. This enabled us to construct a framework called IDWork, which can
be used for categorising existing IoT fingerprinting mechanisms in a way that
will facilitate a coherent and fair comparison of these mechanisms. We found
that the majority of the IoT fingerprinting mechanisms take a passive approach
-- mainly through network sniffing -- instead of being intrusive and
interactive with the device of interest. Additionally, a significant number of
the surveyed mechanisms employ both static and dynamic approaches, in order to
benefit from complementary features that can be more robust against certain
attacks such as spoofing and replay attacks. |
Author | Shahandashti, Siamak F Feraudo, Angelo Arief, Budi Vassilakis, Vassilios G Yadav, Poonam |
Author_xml | – sequence: 1 givenname: Poonam surname: Yadav fullname: Yadav, Poonam – sequence: 2 givenname: Angelo surname: Feraudo fullname: Feraudo, Angelo – sequence: 3 givenname: Budi surname: Arief fullname: Arief, Budi – sequence: 4 givenname: Siamak F surname: Shahandashti fullname: Shahandashti, Siamak F – sequence: 5 givenname: Vassilios G surname: Vassilakis fullname: Vassilakis, Vassilios G |
BackLink | https://doi.org/10.48550/arXiv.2010.08466$$DView paper in arXiv |
BookMark | eNotj01OwzAUhL2ABRQOwApfIMWJHduwqyp-KlWCRZZI0Yv9XCyIHdlWobcnLaxGMyON5rskZyEGJOSmZkuh25bdQfrx-2XD5oBpIeUFeX-L2RcfA51gwvRAVzQfcsERijfUJRjxO6ZP6mKiBgruYvLZhx3dxI5a3HuD1M0e05R8KMdmRPMBwecxX5FzB18Zr_91Qbqnx279Um1fnzfr1bYCqWQFMEhnheE41Bp5DWr-CiD5oAahlZNNK2wt750UVoHWiqFx0lrN7KDrtuELcvs3e8Lr5yMjpEN_xOxPmPwXA_tRFQ |
ContentType | Journal Article |
Copyright | http://arxiv.org/licenses/nonexclusive-distrib/1.0 |
Copyright_xml | – notice: http://arxiv.org/licenses/nonexclusive-distrib/1.0 |
DBID | AKY GOX |
DOI | 10.48550/arxiv.2010.08466 |
DatabaseName | arXiv Computer Science arXiv.org |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: GOX name: arXiv.org url: http://arxiv.org/find sourceTypes: Open Access Repository |
DeliveryMethod | fulltext_linktorsrc |
ExternalDocumentID | 2010_08466 |
GroupedDBID | AKY GOX |
ID | FETCH-LOGICAL-a676-aab6fd4c3eb18e31a7855aa63b7b487f6254d169f64d7a8870ecf6dd80db81523 |
IEDL.DBID | GOX |
IngestDate | Mon Jan 08 05:38:28 EST 2024 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-a676-aab6fd4c3eb18e31a7855aa63b7b487f6254d169f64d7a8870ecf6dd80db81523 |
OpenAccessLink | https://arxiv.org/abs/2010.08466 |
ParticipantIDs | arxiv_primary_2010_08466 |
PublicationCentury | 2000 |
PublicationDate | 2020-10-16 |
PublicationDateYYYYMMDD | 2020-10-16 |
PublicationDate_xml | – month: 10 year: 2020 text: 2020-10-16 day: 16 |
PublicationDecade | 2020 |
PublicationYear | 2020 |
Score | 1.7859592 |
SecondaryResourceType | preprint |
Snippet | The popularity of the Internet of Things (IoT) devices makes it increasingly
important to be able to fingerprint them, for example in order to detect if
there... |
SourceID | arxiv |
SourceType | Open Access Repository |
SubjectTerms | Computer Science - Cryptography and Security Computer Science - Networking and Internet Architecture |
Title | Position paper: A systematic framework for categorising IoT device fingerprinting mechanisms |
URI | https://arxiv.org/abs/2010.08466 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwdV09T8MwED3RTiwIBKh86gbWiCZ27YStgpayABIdOiBFdmyjDk2ipkX8fM5OqrKwJpalvOj87ux3zwB3SikdWypyrClkRHxtIs0zHlFYJc5pl7Bwgj_7kK-L9GnibXJw1wuj1j_L79YfWDf3rfKKKFL0oJckXrL1_LZoDyeDFVc3fj-Ocszw6A9JTI_hqMvucNz-jhM4sOUpfL53wiisVW3XDzjGvX8yup06Cil9RK9P-qoo8IhR8KWao7E-lNGF3Te_CedlyriyvmF32ayaM5hPJ_PHWdRdahApIUVE0AhneMFojUwti5Wkz1BKMC011Q6OyhFuYpE5wY1UtAIMbeGEMenQ6JS4lp1Dv6xKOwC0lHnFzI2Ikw3nNPHIDpkTWVbIQiSFuIBBgCKvW9-K3KOUB5Qu_391BYeJLym9aENcQ3-z3tob6DVmexvA_wU6e4TY |
link.rule.ids | 228,230,782,887 |
linkProvider | Cornell University |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Position+paper%3A+A+systematic+framework+for+categorising+IoT+device+fingerprinting+mechanisms&rft.au=Yadav%2C+Poonam&rft.au=Feraudo%2C+Angelo&rft.au=Arief%2C+Budi&rft.au=Shahandashti%2C+Siamak+F&rft.date=2020-10-16&rft_id=info:doi/10.48550%2Farxiv.2010.08466&rft.externalDocID=2010_08466 |