Computer Science ›› 2024, Vol. 51 ›› Issue (9): 371-382.doi: 10.11896/jsjkx.230800076

• Information Security • Previous Articles     Next Articles

IoT Device Recognition Method Combining Multimodal IoT Device Fingerprint and Ensemble Learning

LU Xulin, LI Zhihua   

  1. School of Artificial Intelligence and Computer,Jiangnan University,Wuxi,Jiangsu 214122,China
  • Received:2023-11-16 Revised:2023-12-26 Online:2024-09-15 Published:2024-09-10
  • About author:LU Xulin,born in 1999,master candidate.His main research interests include information security and so on.
    LI Zhihua,born in 1969,Ph.D,professor,master supervisor.His main research interests include the key techno-logies and information security of the end edge cloud,and its intersection with cutting-edge disciplines such as artificial intelligence.
  • Supported by:
    Intelligent Manufacturing Project of the Ministry of Industry and Information Technology(ZH-XZ-180004) and Fundamental Research Funds for the Central Universities of Ministry of Education of China(JUSRP211A41, JUSRP42003).

Abstract: The existing IoT device recognition methods have the problems of single feature dimension for characterizing device fingerprints,incomplete selection of traffic feature information,which easily lead to insufficient ability to characterize traffic features,and fail to fully exploit the recognition potential of multiple network models,resulting in unsatisfactory recognition results.To address these problems,this paper proposes a method called MultiDI(IoT device recognition method combining multimodal IoT device fingerprint and ensemble learning).First,to enhance the feature representation ability of IoT device fingerprints while preserving the traffic feature information,an improved Nilsimsa algorithm and data visualization method are combined to develop a multimodal IoT device fingerprint generation algorithm.Then,based on the generated IoT device fingerprint features,three neural network models are used to explore the different dimensional information of multimodal fingerprint features,enabling more comprehensive learning and recognition of IoT device traffic features.Lastly,to further explore the recognition potential of multiple network models,a classification connection network is constructed using weighted classification and LeakyRelu activation function.The proposed classification connection network is employed for ensemble learning,integrating the recognition results from multiple network models to enhance the accuracy of the MultiDI method for IoT device recognition.Experimental results show that the MultiDI method achieves 91.3%,98.6% and 99.2% weighted F1 values on the three datasets,respectively,which verifies its effectiveness.Compared with multiple IoT device recognition methods,it presents a relatively good recognition effect,verifing its efficiency.

Key words: Network traffic, Multimodal IoT device fingerprint, Ensemble learning, IoT device recognition

CLC Number: 

  • TP391
[1]STATISTA RESEARCH DEPARTMENT.Internet of Things(IoT) connected devices installed base worldwide from 2015 to 2025[EB/OL].https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/.
[2]FAN L N,LI C C,WU Y C,et al.Survey on IoT Device Identification and Anomaly Detection [J].Ruan Jian Xue Bao,2024,35(1):288-308.
[3]JMILA H,BLANC G,SHAHID M,et al.A Survey of Smart Home IoT Device Classification Using Machine Learning-Based Network Traffic Analysis[J].IEEE Access,2022(10):97117-97141.
[4]ANTONAKAKIS M,APRIL T,BAILEY M,et al.Understan-ding the Mirai Botnet[C]//26th USENIX Security Symposium.2017:1093-1110.
[5]WANODE S,ANAND M,MITRA B.Optimal Feature Set Selection for IoT Device Fingerprinting on Edge Infrastructure using Machine Intelligence[C]//IEEE INFOCOM 2022-IEEE Conference on Computer Communications Workshops(INFOCOM WKSHPS).2022:1-6.
[6]RADHAKRISHNAN S,ULUAGAC A S,ULUAGAC R.GTID:A Technique for Physical Device and Device Type Fingerprinting[J].IEEE Transactions on Dependable and Secure Computing,2015,12(5):519-532.
[7]YUAN H L,HU A Q.Preamble-based detection of Wi-Fi transmitter RF fingerprints[J].Electronics Letters,2010(46):1165-1167.
[8]FENG X,LI Q,HAN Q,et al.Active Profiling of Physical Devices at Internet Scale[C]//2016 25th International Conference on Computer Communication and Networks(ICCCN).2016:1-9.
[9]MIETTINEN M,MARCHAL S,HAFEEZ I,et al.IoT sentinel: Automated device-type identification for security enforcement in iot[C]//2017 IEEE 37th International Conference on Distributed Computing Systems(ICDCS).IEEE,2017:2177-2184.
[10]BRUHADESHWAR B,MAALVIKA B,JORDANP,et al.Behavioral Fingerprinting of IoT Devices[C]//Association for Computing Machinery.2018:41-50.
[11]KOSTAS K,JUST M,LONES M A.IoTDevID:A Behavior-Based Device Identification Method for the IoT[J].IEEE Internet of Things Journal,2022,9(23):23741-23749.
[12]KOTAK J,ELOVICI Y.IoT Device Identification Using Deep Learning[C]//13th International Conference on Computational Intelligence in Security for Information Systems.2020:76-86.
[13]YIN F,YANG L,WANG Y,et al.IoT ETEI:End-to-End IoTDevice Identification Method[C]//2021 IEEE Conference on Dependable and Secure Computing(DSC).2021:1-8.
[14]THOM J,THOM N,SENGUPTA S,et al.Smart Recon:Net-work Traffic Fingerprinting for IoT Device Identification[C]//2022 IEEE 12th Annual Computing and Communication Workshop and Conference(CCWC).2022:72-79.
[15]HAO Q X,RONG Z,XIE L J,et al.Online IoT Device Identification Method Based on Bi-LSTM[J].Journal of Xi'an University of Science and Technology,2023,43(2):422-430.
[16]PANG Y L,LI X W.Feature Selection Algorithm of Network Traffic Based on SU and AMB[J].Computer Systems & Applications,2022,31(4):281-287.
[17]JACOBS R.Tshark[EB/OL].https://tshark.dev/export/.
[18]GUILLAUME G, PIERRE V,et al.Scapy[EB/OL].https://scapy.net/.
[19]ERNESTO D,SABRINA V,STEFANO P,et al.An Open Digest-based Technique for Spam Detection.Parallel and Distributed Computing Systems[J/OL].https://www.researchgate.net/publication/220922423_An_Open_Digest-based_Technique_for_Spam_Detection.
[20]FUENTEALBA P,CHAMORRO E,SANTOS J C.Chapter 5Understanding and using the electron localization function[J].Theoretical Aspects of Chemical Reactivity,2008(19):57-85.
[21]JU C,BIBAUT A,LAAN M.The Relative Performance of Ensemble Methods with Deep Convolutional Neural Networks for Image Classification[J].Journal of Applied Statistics,2018,45(15):2800-2818.
[22]HUANG G,LIU Z,MAATEN L V D,et al.Densely Connected Convolutional Networks[C]//2017 IEEE Conference on Computer Vision and Pattern Recognition.2018.
[23]FRANÇOIS C.Xception:Deep Learning with Depthwise Separable Convolutions[C]//2017 IEEE Conference on Computer Vision and Pattern Recognition.2017.
[24]MIETTINEN M,MARCHAL S,HAFEEZ I,et al.IoT Sentinel:Automated Device-Type Identification for Security Enforcement in IoT[C]//2017 IEEE 37th International Conference on Distributed Computing Systems.2017:2511-2514.
[25]SIVANATHAN A,GHARAKHEILI H H,LOI F,et al.Classifying IoT devices in smart environments using network traffic characteristics[J].IEEE Transactions on Mobile Computing,2019,18(8):1745-1759.
[26]CHARYYEV B,GUNES M H.IoT Traffic Flow Identification using Locality Sensitive Hashes[C]//2020 IEEE International Conference on Communications(ICC 2020).2020:1-6.
[1] ZHENG Haibin, LIU Xinran, CHEN Jinyin, WANG Pengcheng, WANG Xuanye. Integrity Interference Attack and Defense Methods for Network Traffic Measurement [J]. Computer Science, 2024, 51(8): 420-428.
[2] LIANG Meiyan, FAN Yingying, WANG Lin. Fine-grained Colon Pathology Images Classification Based on Heterogeneous Ensemble Learningwith Multi-distance Measures [J]. Computer Science, 2024, 51(6A): 230400043-7.
[3] LI Xinrui, ZHANG Yanfang, KANG Xiaodong, LI Bo, HAN Junling. Intelligent Diagnosis of Brain Tumor with MRI Based on Ensemble Learning [J]. Computer Science, 2024, 51(6A): 230600043-7.
[4] ZHUO Peiyan, ZHANG Yaona, LIU Wei, LIU Zijin, SONG You. CTGANBoost:Credit Fraud Detection Based on CTGAN and Boosting [J]. Computer Science, 2024, 51(6A): 230600199-7.
[5] KANG Wei, LI Lihui, WEN Yimin. Semi-supervised Classification of Data Stream with Concept Drift Based on Clustering Model Reuse [J]. Computer Science, 2024, 51(4): 124-131.
[6] LIANG Chen, HONG Zheng, WU Lifa, JI Qingbing. Cryptographic Protocol Reverse Method Based on Information Entropy and Closed Frequent Sequences [J]. Computer Science, 2024, 51(3): 326-334.
[7] ZHANG Desheng, CHEN Bo, ZHANG Jianhui, BU Youjun, SUN Chongxin, SUN Jia. Browser Fingerprint Recognition Based on Improved Self-paced Ensemble Algorithm [J]. Computer Science, 2023, 50(7): 317-324.
[8] YANG Qianlong, JIANG Lingyun. Study on Load Balancing Algorithm of Microservices Based on Machine Learning [J]. Computer Science, 2023, 50(5): 313-321.
[9] HU Zhongyuan, XUE Yu, ZHA Jiajie. Survey on Evolutionary Recurrent Neural Networks [J]. Computer Science, 2023, 50(3): 254-265.
[10] DU Qingpeng, XU Yinlong, WU Si. Stripe Matching and Merging Algorithm-based Redundancy Transition for Locally Repairable Codes [J]. Computer Science, 2023, 50(12): 89-96.
[11] MA Jiye, ZHU Guosheng, WEI Cao, ZENG Yuxuan. Noise Tolerant Algorithm for Network Traffic Classification Method [J]. Computer Science, 2023, 50(11A): 220800120-7.
[12] YAN Yuanting, MA Yingao, REN Yanping, ZHANG Yanping. Imbalanced Undersampling Based on Constructive Neural Network and Global Density Information [J]. Computer Science, 2023, 50(10): 48-58.
[13] HE Yulin, ZHU Penghui, HUANG Zhexue, Fournier-Viger PHILIPPE. Classification Uncertainty Minimization-based Semi-supervised Ensemble Learning Algorithm [J]. Computer Science, 2023, 50(10): 88-95.
[14] DING Xuhui, ZHANG Linlin, ZHAO Kai, WANG Xusheng. Android Application Privacy Disclosure Detection Method Based on Static and Dynamic Combination [J]. Computer Science, 2023, 50(10): 327-335.
[15] WANG Xin-tong, WANG Xuan, SUN Zhi-xin. Network Traffic Anomaly Detection Method Based on Multi-scale Memory Residual Network [J]. Computer Science, 2022, 49(8): 314-322.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!