Computer Science ›› 2024, Vol. 51 ›› Issue (9): 371-382.doi: 10.11896/jsjkx.230800076
• Information Security • Previous Articles Next Articles
LU Xulin, LI Zhihua
CLC Number:
[1]STATISTA RESEARCH DEPARTMENT.Internet of Things(IoT) connected devices installed base worldwide from 2015 to 2025[EB/OL].https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/. [2]FAN L N,LI C C,WU Y C,et al.Survey on IoT Device Identification and Anomaly Detection [J].Ruan Jian Xue Bao,2024,35(1):288-308. [3]JMILA H,BLANC G,SHAHID M,et al.A Survey of Smart Home IoT Device Classification Using Machine Learning-Based Network Traffic Analysis[J].IEEE Access,2022(10):97117-97141. [4]ANTONAKAKIS M,APRIL T,BAILEY M,et al.Understan-ding the Mirai Botnet[C]//26th USENIX Security Symposium.2017:1093-1110. [5]WANODE S,ANAND M,MITRA B.Optimal Feature Set Selection for IoT Device Fingerprinting on Edge Infrastructure using Machine Intelligence[C]//IEEE INFOCOM 2022-IEEE Conference on Computer Communications Workshops(INFOCOM WKSHPS).2022:1-6. [6]RADHAKRISHNAN S,ULUAGAC A S,ULUAGAC R.GTID:A Technique for Physical Device and Device Type Fingerprinting[J].IEEE Transactions on Dependable and Secure Computing,2015,12(5):519-532. [7]YUAN H L,HU A Q.Preamble-based detection of Wi-Fi transmitter RF fingerprints[J].Electronics Letters,2010(46):1165-1167. [8]FENG X,LI Q,HAN Q,et al.Active Profiling of Physical Devices at Internet Scale[C]//2016 25th International Conference on Computer Communication and Networks(ICCCN).2016:1-9. [9]MIETTINEN M,MARCHAL S,HAFEEZ I,et al.IoT sentinel: Automated device-type identification for security enforcement in iot[C]//2017 IEEE 37th International Conference on Distributed Computing Systems(ICDCS).IEEE,2017:2177-2184. [10]BRUHADESHWAR B,MAALVIKA B,JORDANP,et al.Behavioral Fingerprinting of IoT Devices[C]//Association for Computing Machinery.2018:41-50. [11]KOSTAS K,JUST M,LONES M A.IoTDevID:A Behavior-Based Device Identification Method for the IoT[J].IEEE Internet of Things Journal,2022,9(23):23741-23749. [12]KOTAK J,ELOVICI Y.IoT Device Identification Using Deep Learning[C]//13th International Conference on Computational Intelligence in Security for Information Systems.2020:76-86. [13]YIN F,YANG L,WANG Y,et al.IoT ETEI:End-to-End IoTDevice Identification Method[C]//2021 IEEE Conference on Dependable and Secure Computing(DSC).2021:1-8. [14]THOM J,THOM N,SENGUPTA S,et al.Smart Recon:Net-work Traffic Fingerprinting for IoT Device Identification[C]//2022 IEEE 12th Annual Computing and Communication Workshop and Conference(CCWC).2022:72-79. [15]HAO Q X,RONG Z,XIE L J,et al.Online IoT Device Identification Method Based on Bi-LSTM[J].Journal of Xi'an University of Science and Technology,2023,43(2):422-430. [16]PANG Y L,LI X W.Feature Selection Algorithm of Network Traffic Based on SU and AMB[J].Computer Systems & Applications,2022,31(4):281-287. [17]JACOBS R.Tshark[EB/OL].https://tshark.dev/export/. [18]GUILLAUME G, PIERRE V,et al.Scapy[EB/OL].https://scapy.net/. [19]ERNESTO D,SABRINA V,STEFANO P,et al.An Open Digest-based Technique for Spam Detection.Parallel and Distributed Computing Systems[J/OL].https://www.researchgate.net/publication/220922423_An_Open_Digest-based_Technique_for_Spam_Detection. [20]FUENTEALBA P,CHAMORRO E,SANTOS J C.Chapter 5Understanding and using the electron localization function[J].Theoretical Aspects of Chemical Reactivity,2008(19):57-85. [21]JU C,BIBAUT A,LAAN M.The Relative Performance of Ensemble Methods with Deep Convolutional Neural Networks for Image Classification[J].Journal of Applied Statistics,2018,45(15):2800-2818. [22]HUANG G,LIU Z,MAATEN L V D,et al.Densely Connected Convolutional Networks[C]//2017 IEEE Conference on Computer Vision and Pattern Recognition.2018. [23]FRANÇOIS C.Xception:Deep Learning with Depthwise Separable Convolutions[C]//2017 IEEE Conference on Computer Vision and Pattern Recognition.2017. [24]MIETTINEN M,MARCHAL S,HAFEEZ I,et al.IoT Sentinel:Automated Device-Type Identification for Security Enforcement in IoT[C]//2017 IEEE 37th International Conference on Distributed Computing Systems.2017:2511-2514. [25]SIVANATHAN A,GHARAKHEILI H H,LOI F,et al.Classifying IoT devices in smart environments using network traffic characteristics[J].IEEE Transactions on Mobile Computing,2019,18(8):1745-1759. [26]CHARYYEV B,GUNES M H.IoT Traffic Flow Identification using Locality Sensitive Hashes[C]//2020 IEEE International Conference on Communications(ICC 2020).2020:1-6. |
[1] | ZHENG Haibin, LIU Xinran, CHEN Jinyin, WANG Pengcheng, WANG Xuanye. Integrity Interference Attack and Defense Methods for Network Traffic Measurement [J]. Computer Science, 2024, 51(8): 420-428. |
[2] | LIANG Meiyan, FAN Yingying, WANG Lin. Fine-grained Colon Pathology Images Classification Based on Heterogeneous Ensemble Learningwith Multi-distance Measures [J]. Computer Science, 2024, 51(6A): 230400043-7. |
[3] | LI Xinrui, ZHANG Yanfang, KANG Xiaodong, LI Bo, HAN Junling. Intelligent Diagnosis of Brain Tumor with MRI Based on Ensemble Learning [J]. Computer Science, 2024, 51(6A): 230600043-7. |
[4] | ZHUO Peiyan, ZHANG Yaona, LIU Wei, LIU Zijin, SONG You. CTGANBoost:Credit Fraud Detection Based on CTGAN and Boosting [J]. Computer Science, 2024, 51(6A): 230600199-7. |
[5] | KANG Wei, LI Lihui, WEN Yimin. Semi-supervised Classification of Data Stream with Concept Drift Based on Clustering Model Reuse [J]. Computer Science, 2024, 51(4): 124-131. |
[6] | LIANG Chen, HONG Zheng, WU Lifa, JI Qingbing. Cryptographic Protocol Reverse Method Based on Information Entropy and Closed Frequent Sequences [J]. Computer Science, 2024, 51(3): 326-334. |
[7] | ZHANG Desheng, CHEN Bo, ZHANG Jianhui, BU Youjun, SUN Chongxin, SUN Jia. Browser Fingerprint Recognition Based on Improved Self-paced Ensemble Algorithm [J]. Computer Science, 2023, 50(7): 317-324. |
[8] | YANG Qianlong, JIANG Lingyun. Study on Load Balancing Algorithm of Microservices Based on Machine Learning [J]. Computer Science, 2023, 50(5): 313-321. |
[9] | HU Zhongyuan, XUE Yu, ZHA Jiajie. Survey on Evolutionary Recurrent Neural Networks [J]. Computer Science, 2023, 50(3): 254-265. |
[10] | DU Qingpeng, XU Yinlong, WU Si. Stripe Matching and Merging Algorithm-based Redundancy Transition for Locally Repairable Codes [J]. Computer Science, 2023, 50(12): 89-96. |
[11] | MA Jiye, ZHU Guosheng, WEI Cao, ZENG Yuxuan. Noise Tolerant Algorithm for Network Traffic Classification Method [J]. Computer Science, 2023, 50(11A): 220800120-7. |
[12] | YAN Yuanting, MA Yingao, REN Yanping, ZHANG Yanping. Imbalanced Undersampling Based on Constructive Neural Network and Global Density Information [J]. Computer Science, 2023, 50(10): 48-58. |
[13] | HE Yulin, ZHU Penghui, HUANG Zhexue, Fournier-Viger PHILIPPE. Classification Uncertainty Minimization-based Semi-supervised Ensemble Learning Algorithm [J]. Computer Science, 2023, 50(10): 88-95. |
[14] | DING Xuhui, ZHANG Linlin, ZHAO Kai, WANG Xusheng. Android Application Privacy Disclosure Detection Method Based on Static and Dynamic Combination [J]. Computer Science, 2023, 50(10): 327-335. |
[15] | WANG Xin-tong, WANG Xuan, SUN Zhi-xin. Network Traffic Anomaly Detection Method Based on Multi-scale Memory Residual Network [J]. Computer Science, 2022, 49(8): 314-322. |
|