论文标题

位置纸:用于对物联网设备指纹机制进行分类的系统框架

Position paper: A systematic framework for categorising IoT device fingerprinting mechanisms

论文作者

Yadav, Poonam, Feraudo, Angelo, Arief, Budi, Shahandashti, Siamak F., Vassilakis, Vassilios G.

论文摘要

物联网(IoT)设备的流行使得能够指纹贴上越来越重要,例如,为了检测网络中是否有不当行为甚至是恶意的物联网设备。本文的目的是提供机器学习增强技术的系统分类,可用于指纹物联网设备。这可以作为比较各种物联网指纹机制的基线,因此网络管理员可以选择适合监视和维护其网络的一种或多种机制。我们对有关指纹物联网设备的现有论文进行了广泛的文献综述 - 密切关注那些具有机器学习功能的人。接下来是在这些论文中概述的机制之间提取重要和可比的特征。结果,我们提出了一组关键术语集,这些术语在指纹上下文和物联网域中都相关。这使我们能够构建一个名为IDWork的框架,该框架可用于以一种有助于对这些机制进行连贯且公平的比较的方式对现有的物联网指纹机制进行分类。我们发现,大多数物联网指纹机制采用被动方法(主要是通过网络嗅探)采用,而不是与感兴趣的设备具有侵入性和互动性。此外,许多被调查的机制都采用静态和动态方法,以便从互补特征中受益,这些功能可以在某些攻击(例如欺骗和重播攻击)上更强大。

The popularity of the Internet of Things (IoT) devices makes it increasingly important to be able to fingerprint them, for example in order to detect if there are misbehaving or even malicious IoT devices in one's network. The aim of this paper is to provide a systematic categorisation of machine learning augmented techniques that can be used for fingerprinting IoT devices. This can serve as a baseline for comparing various IoT fingerprinting mechanisms, so that network administrators can choose one or more mechanisms that are appropriate for monitoring and maintaining their network. We carried out an extensive literature review of existing papers on fingerprinting IoT devices -- paying close attention to those with machine learning features. This is followed by an extraction of important and comparable features among the mechanisms outlined in those papers. As a result, we came up with a key set of terminologies that are relevant both in the fingerprinting context and in the IoT domain. This enabled us to construct a framework called IDWork, which can be used for categorising existing IoT fingerprinting mechanisms in a way that will facilitate a coherent and fair comparison of these mechanisms. We found that the majority of the IoT fingerprinting mechanisms take a passive approach -- mainly through network sniffing -- instead of being intrusive and interactive with the device of interest. Additionally, a significant number of the surveyed mechanisms employ both static and dynamic approaches, in order to benefit from complementary features that can be more robust against certain attacks such as spoofing and replay attacks.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源