Survey on IoT Device Identification and Anomaly Detection

被引:0
|
作者
Fan L.-N. [1 ,2 ,3 ]
Li C.-L. [1 ]
Wu Y.-C. [1 ,2 ]
Duan C.-X. [1 ,2 ]
Wang Z.-L. [1 ,2 ]
Lin H. [1 ,2 ]
Yang J.-H. [1 ,2 ]
机构
[1] Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing
[2] Beijing National Research Center for Information Science and Technology, Beijing
[3] College of Information and Communication, National University of Defense Technology, Wuhan
来源
Ruan Jian Xue Bao/Journal of Software | 2024年 / 35卷 / 01期
关键词
anomaly detection; device identification; Internet of Things (IoT);
D O I
10.13328/j.cnki.jos.006818
中图分类号
学科分类号
摘要
With the development of Internet of Things (IoT) technology, IoT devices are widely applied in many areas of production and life. However, IoT devices also bring severe challenges to equipment asset management and security management. Firstly, Due to the diversity of IoT device types and access modes, it is often difficult for network administrators to know the IoT device types and operating status in the network. Secondly, IoT devices are becoming the focus of cyber attacks due to their limited computing and storage resources, which makes it difficult to deploy traditional defense measures. Therefore, it is important to acknowledge the IoT devices in the network through device identification and detect anomalies based on the device identification results, so as to ensure the normal operation of IoT devices. In recent years, academia has carried out a lot of research on the above issues. This study systematically reviews the work related to IoT device identification and anomaly detection. In terms of device identification, existing research can be divided into passive identification methods and active identification methods according to whether data packets are sent to the network. The passive identification methods are further investigated according to the identification method, identification granularity, and application scenarios. The study also investigates the active identification methods according to the identification method, identification granularity, and detection granularity. In terms of anomaly detection, the existing work can be divided into detection methods based on machine learning algorithms and rule-matching methods based on behavioral norms. On this basis, challenges in IoT device identification and anomaly detection are summarized, and the future development direction is proposed. © 2024 Chinese Academy of Sciences. All rights reserved.
引用
收藏
页码:288 / 308
页数:20
相关论文
共 87 条
  • [1] Al-Fuqaha A, Guizani M, Mohammadi M, Aledhari M, Ayyash M., Internet of Things: A survey on enabling technologies, protocols, and applications, IEEE Communications Surveys & Tutorials, 17, 4, pp. 2347-2376, (2015)
  • [2] Torchia M, Shirer M., IDC forecasts worldwide technology spending on the Internet of Things to reach $1.2 trillion in 2022, (2018)
  • [3] Antonakakis M, April T, Bailey M, Bernhard M, Bursztein E, Cochran J, Durumeric Z, Halderman JA, Invernizzi L, Kallitsis M, Kumar D, Lever C, Ma ZE, Mason J, Menscher D, Seaman C, Sullivan N, Thomas K, Zhou Y., Understanding the Mirai Botnet, Proc. of the 26th USENIX Conf. on Security Symp, pp. 1093-1110, (2017)
  • [4] Herwig S, Harvey K, Hughey G, Roberts R, Levin D., Measurement and analysis of Hajime, a peer-to-peer IoT Botnet, Proc. of the 2019 Network and Distributed Systems Security Symp, pp. 1-15, (2019)
  • [5] Soltan S, Mittal P, Poor HV., BlackIoT: IoT Botnet of high wattage devices can disrupt the power grid, Proc. of the 27th USENIX Conf. on Security Symp, pp. 15-32, (2018)
  • [6] Tahaei H, Afifi F, Asemi A, Zaki F, Anuar NB., The rise of traffic classification in IoT networks: A survey, Journal of Network and Computer Applications, 154, (2020)
  • [7] Liu YX, Wang J, Li JQ, Niu ST, Song HB., Machine learning for the detection and identification of Internet of Things devices: A survey, IEEE Internet of Things Journal, 9, 1, pp. 298-320, (2022)
  • [8] Mazhar N, Salleh R, Zeeshan M, Hameed MM., Role of device identification and manufacturer usage description in IoT security: A survey, IEEE Access, 9, pp. 41757-41786, (2021)
  • [9] Lear E, Droms R, Romascanu D., Manufacturer usage description specification, (2019)
  • [10] Meidan Y, Bohadana M, Shabtai A, Guarnizo JD, Ochoa M, Tippenhauer NO, Elovici Y., ProfilIoT: A machine learning approach for IoT device identification based on network traffic analysis, Proc. of the 2017 Symp. on Applied Computing, pp. 506-509, (2017)