Traffic Behavior-based Device Type Classification

被引:4
|
作者
Takasaki, Chikako [1 ]
Korikawa, Tomohiro [1 ]
Hattori, Kyota [1 ]
Ohwada, Hidenari [1 ]
机构
[1] NTT Network Serv Syst Labs, Tokyo, Japan
关键词
Device type classification; traffic behavior analysis; machine learning; deep learning;
D O I
10.1109/ICNC57223.2023.10074041
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Network operators play a fundamental role of providing network connectivity which fulfill service requirements of user devices. In the evolved 5G and 6G, the Internet of Things (IoT) is used for various purposes and the number of network connected devices is increasing. Typical types of connected devices in a network are not only IoT but also mobile phones and PCs, which may vary each access point or cell. For this reason, better network design and management requires awareness of connected device types based on traffic, service types, and surroundings. Possible approaches for device type classification can be categorized in two classes: analysis based on system logs and management databases; and analysis based on traffic contents and behavior in the network. However, data which network operators can collect is limited to traffic behavior because of privacy law and immature standardization of connected device-related data. Therefore, a new approach to classify device types in the network, whose connected devices are not limited to IoT, based on traffic behavior is necessary. This paper proposes a method to classify device types, such as hubs and cameras by analyzing only traffic behavior, without using traffic contents, in two stages. In the first stage, the proposed method classifies general device types, such as IoT and not IoT, by analyzing packet header statistics using machine learning. Then, in the second stage, the proposed method classifies connected devices that are classified as IoT in the first stage into IoT device types, by analyzing time series traffic behaviors using deep learning. We demonstrate that the proposed method classifies device type by analyzing real traffic dataset and outperforms the existing IoT-only device classification methods in terms of the number of types and the accuracy. The proposed method is suitable for automated network design, management, and control where a number of various devices are connected.
引用
收藏
页码:353 / 357
页数:5
相关论文
共 50 条
  • [1] An empirical study of morphing on behavior-based network traffic classification
    Qu, Buyun
    Zhang, Zhibin
    Zhu, Xingquan
    Meng, Dan
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (01) : 68 - 79
  • [2] TrafficS: A Behavior-Based Network Traffic Classification Benchmark System with Traffic Sampling Functionality
    Yan, Xiaoyan
    Liang, Bo
    Ban, Tao
    Guo, Shanqing
    Wang, Liming
    [J]. NEURAL INFORMATION PROCESSING, ICONIP 2012, PT IV, 2012, 7666 : 100 - 107
  • [3] Device Type Classification Based on Two-Stage Traffic Behavior Analysis
    Takasaki, Chikako
    Korikawa, Tomohiro
    Hattori, Kyota
    Ohwada, Hidenari
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2024, E107B (01) : 117 - 125
  • [4] Behavior-based Speciation in Classification with NeuroEvolution
    Papavasileiou, Evgenia
    Cornelis, Jan
    Jansen, Bart
    [J]. 2020 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION (CEC), 2020,
  • [5] IoTDevID: A Behavior-Based Device Identification Method for the IoT
    Kostas, Kahraman
    Just, Mike
    Lones, Michael A.
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (23) : 23741 - 23749
  • [6] Behavior-based tracking: Exploiting characteristic patterns in DNS traffic
    Herrmann, Dominik
    Banse, Christian
    Federrath, Hannes
    [J]. COMPUTERS & SECURITY, 2013, 39 : 17 - 33
  • [7] Behavior-Based Advertising
    Shen, Qiaowei
    Villas-Boas, J. Miguel
    [J]. MANAGEMENT SCIENCE, 2018, 64 (05) : 2047 - 2064
  • [8] Behavior-Based Method for Real-Time Identification of Encrypted Proxy Traffic
    Luo, Ping
    Wang, Fei
    Chen, Shuhui
    Li, Zhenxing
    [J]. 2021 13TH INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN 2021), 2021, : 289 - 295
  • [9] AMAL: High-fidelity, behavior-based automated malware analysis and classification
    Mohaisen, Aziz
    Alrawi, Omar
    Mohaisen, Manar
    [J]. COMPUTERS & SECURITY, 2015, 52 : 251 - 266
  • [10] AMAL: High-Fidelity, Behavior-Based Automated Malware Analysis and Classification
    Mohaisen, Aziz
    Alrawi, Omar
    [J]. INFORMATION SECURITY APPLICATIONS, WISA 2014, 2015, 8909 : 107 - 121