[go: up one dir, main page]

Hamad et al., 2019 - Google Patents

Iot device identification via network-flow based fingerprinting and learning

Hamad et al., 2019

Document ID
5767555080329944059
Author
Hamad S
Zhang W
Sheng Q
Nepal S
Publication year
Publication venue
2019 18th IEEE international conference on trust, security and privacy in computing and communications/13th IEEE international conference on big data science and engineering (TrustCom/BigDataSE)

External Links

Snippet

Nowadays, increasing number of intelligent devices and smart sensors are connected by Internet of Things (IoT) techniques, and have helped people to manage and improve their lives. However, security issues are emerging in IoT, among which things identification is one …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic regulation in packet switching networks
    • H04L47/10Flow control or congestion control
    • H04L47/24Flow control or congestion control depending on the type of traffic, e.g. priority or quality of service [QoS]
    • H04L47/2441Flow classification
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0236Filtering by address, protocol, port number or service, e.g. IP-address or URL
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. local area networks [LAN], wide area networks [WAN]

Similar Documents

Publication Publication Date Title
Hamad et al. Iot device identification via network-flow based fingerprinting and learning
US11848950B2 (en) Method for protecting IoT devices from intrusions by performing statistical analysis
Meidan et al. Detection of unauthorized IoT devices using machine learning techniques
Bijone A survey on secure network: intrusion detection & prevention approaches
US20180278636A1 (en) System and method for malware detection learning
Fernando et al. Enhancing intrusion detection in IoT communications through ML model generalization with a new dataset (IDSAI)
Fallah et al. Android malware detection using network traffic based on sequential deep learning models
Kornyo et al. Botnet attacks classification in AMI networks with recursive feature elimination (RFE) and machine learning algorithms
Salunkhe et al. Security enrichment in intrusion detection system using classifier ensemble
Kamel et al. Distributed denial of service attacks detection for software defined networks based on evolutionary decision tree model
GB2616346A (en) A system and method for autonomously fingerprinting and enumerating Internet of Thing (IoT) devices based on nated IPFIX and DNS traffic
Le et al. Unsupervised monitoring of network and service behaviour using self organizing maps
Aluthge Iot device fingerprinting with sequence-based features
Lah et al. Proposed framework for network lateral movement detection based on user risk scoring in siem
Alshammari et al. Scalable and robust intrusion detection system to secure the IoT environments using software defined networks (SDN) enabled architecture
Yusufovna Integrating intrusion detection system and data mining
Murthy et al. A lightweight Intrusion Detection for Internet of Things‐based smart buildings
Brahma et al. Device identification using network traces in a smart home IoT network
McLaren et al. Mining malware command and control traces
Matke et al. An empirical evaluation of machine learning algorithms for intrusion detection in iiot networks
Shriyal et al. IoT device classification techniques and traffic analysis-A review
Babu et al. A Hybrid Intrusion Detection System against Botnet Attack in IoT Using Light Weight Signature and Ensemble Learning Technique
Kurmi et al. Device identification in iot networks using network trace fingerprinting
Prasad et al. Context-Aware Behavioral Fingerprinting of IoT Devices via Network Traffic Analysis.
Gutiérrez Portela et al. Enhancing intrusion detection in IoT communications through ML model generalization with a new dataset (IDSAI)