Computer Science ›› 2023, Vol. 50 ›› Issue (8): 304-313.doi: 10.11896/jsjkx.220900145
• Information Security • Previous Articles Next Articles
ZHU Boyu1, CHEN Xiao1, SHA Letian1,2, XIAO Fu1,2
CLC Number:
[1]Internet of Things statistics for 2022-Taking Things Apart[OL].https://dataprot.net/statistics/iot-statistics. [2]ANTONAKAKIS M,APRIL T,BAILEY M,et al.Understan-ding the mirai botnet[C]//26th USENIX Security Symposium.Vancouver,BC:USENIX Association,2017:1093-1110. [3]A giant botnet hiding around us:Pink[OL].https://blog.netlab.360.com/pinkbot. [4]KOHNO T,BROIDO A,CLAFFY K C.Remote physical device fingerprinting[J].IEEE Transactions on Dependable and Secure Computing,2005,2(2):93-108. [5]LANZE F,PANCHENKO A,BRAATZ B,et al.Clock skewbased remote device fingerprinting demystified[C]//2012 IEEE Global Communications Conference(GLOBECOM).IEEE,2012:813-819. [6]LI Q,JIA Y X,SONG J K,et al.Search of Internet of Thing Information in the Cyberspace[J].Journal of Cyber Security,2018,3(5):38-53. [7]CAO L C,ZHAO J J,CUI X,et al.Cyberspace device identification based on K-means with cosine distance measure[J].Journal of University of Chinese Academy of Sciences,2016,33(4):562-569. [8]REN C L,GU Y,CUI J,et al.Web Features-based RecognitionSpecific-Type IoT Device in Cyberspace[J].Communications Technology,2017,50(5):1003-1009. [9]SONG Y B,QI X Y,HUANG Q,et al.Two-stage multi-classification algorithm for Internet of Things equipment identification[J].Journal of Tsinghua University(Science and Technology),2020,60(5):365-370. [10]LI Q,FENG X,LI Z,et al.GUIDE:Graphical user interface fingerprints physical devices[C]//2016 IEEE 24th International Conference on Network Protocols(ICNP).IEEE,2016:1-2. [11]YU L,LUO B,MA J,et al.You Are What You Broadcast:Identification of Mobile and IoT Devices from(Public)WiFi[C]//29th USENIX Security Symposium.2020:55-72. [12]MIETTINEN M,MARCHAL S,HAFEEZ I,et al.Iot sentinel:Automated device-type identification for security enforcement in iot[C]//2017 IEEE 37th International Conference on Distributed Computing Systems(ICDCS).2017:2177-2184. [13]BEZAWADA B,BACHANI M,PETERSON J,et al.IoTSense:Behavioral fingerprinting of iot devices[C]//Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security.2018:41-50. [14]SIVANATHAN A,GHARAKHEILI H,LOI F,et al.Classi-fying IoT Devices in Smart Environments Using Network Traffic Characteristics[J].IEEE Transactions on Mobile Computing,2019,18(8):1745-1759. [15]DONG S,LI Z,TANG D,et al.Your smart home can't keep a secret:Towards automated fingerprinting of iot traffic[C]//Proceedings of the 15th ACM Asia Conference on Computer and Communications Security.2020:47-59. [16]KOSTAS K,JUST M,LONES M A.IoTDevID:A Behavior-Based Device Identification Method for the IoT[J].IEEE Internet of Things Journal,2022,9(23):23741-23749. [17]HOFFMAN P,MCMANUS P.DNS Queries over HTTPS(DoH).RFC 8484[J/OL].https://doi.org/10.17487/RFC8484. [18]JA3 Fingerprint[OL].https://en.everybodywiki.com/JA3_Fingerprint. [19]Mercury[OL].https://github.com/cisco/mercury. [20]Bag-of-words model[OL].https://en.wikipedia.org/wiki/Bag-of-words_model. [21]Bow vs Sow-What's the difference?[OL].https://wikidiff.com/sow/bow. [22]AL-GARADI M A,MOHAMED A,AL-ALI A,et al.A survey of machine and deep learning methods for Internet of things(IoT) security[J].IEEE Communications Surveys & Tutorials,2020,22(3):1646-1685. |
[1] | WANG Yu, WANG Zuchao, PAN Rui. Survey of DGA Domain Name Detection Based on Character Feature [J]. Computer Science, 2023, 50(8): 251-259. |
[2] | LI Yang, LI Zhenhua, XIN Xianlong. Attack Economics Based Fraud Detection for MVNO [J]. Computer Science, 2023, 50(8): 260-270. |
[3] | LU Xingyuan, CHEN Jingwei, FENG Yong, WU Wenyuan. Privacy-preserving Data Classification Protocol Based on Homomorphic Encryption [J]. Computer Science, 2023, 50(8): 321-332. |
[4] | LIU Xiang, ZHU Jing, ZHONG Guoqiang, GU Yongjian, CUI Liyuan. Quantum Prototype Clustering [J]. Computer Science, 2023, 50(8): 27-36. |
[5] | WANG Xiya, ZHANG Ning, CHENG Xin. Review on Methods and Applications of Text Fine-grained Emotion Recognition [J]. Computer Science, 2023, 50(6A): 220900137-7. |
[6] | WANG Dongli, YANG Shan, OUYANG Wanli, LI Baopu, ZHOU Yan. Explainability of Artificial Intelligence:Development and Application [J]. Computer Science, 2023, 50(6A): 220600212-7. |
[7] | WANG Jinjin, CHENG Yinhui, NIE Xin, LIU Zheng. Fast Calculation Method of High-altitude Electromagnetic Pulse Environment Based on Machine Learning [J]. Computer Science, 2023, 50(6A): 220500046-5. |
[8] | YIN Xingzi, PENG Ningning, ZHAN Xueyan. Filtered Feature Selection Algorithm Based on Persistent Homology [J]. Computer Science, 2023, 50(6): 159-166. |
[9] | CHEN Jinjie, HE Chao, XIAO Xiao, LEI Yinjie. Optical Performance Monitoring Method Based on Fine-grained Constellation Diagram Recognition [J]. Computer Science, 2023, 50(4): 220-225. |
[10] | PENG Yuefeng, ZHAO Bo, LIU Hui, AN Yang. Survey on Membership Inference Attacks Against Machine Learning [J]. Computer Science, 2023, 50(3): 351-359. |
[11] | XU Xia, ZHANG Hui, YANG Chunming, LI Bo, ZHAO Xujian. Fair Method for Spectral Clustering to Improve Intra-cluster Fairness [J]. Computer Science, 2023, 50(2): 158-165. |
[12] | WANG Yitan, WANG Yishu, YUAN Ye. Survey of Learned Index [J]. Computer Science, 2023, 50(1): 1-8. |
[13] | CHEN Depeng, LIU Xiao, CUI Jie, HE Daojing. Survey of Membership Inference Attacks for Machine Learning [J]. Computer Science, 2023, 50(1): 302-317. |
[14] | LENG Dian-dian, DU Peng, CHEN Jian-ting, XIANG Yang. Automated Container Terminal Oriented Travel Time Estimation of AGV [J]. Computer Science, 2022, 49(9): 208-214. |
[15] | NING Han-yang, MA Miao, YANG Bo, LIU Shi-chang. Research Progress and Analysis on Intelligent Cryptology [J]. Computer Science, 2022, 49(9): 288-296. |
|