Traffic Behavior-based Device Type Classification

被引:4
|
作者
Takasaki, Chikako [1 ]
Korikawa, Tomohiro [1 ]
Hattori, Kyota [1 ]
Ohwada, Hidenari [1 ]
机构
[1] NTT Network Serv Syst Labs, Tokyo, Japan
来源
2023 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS, ICNC | 2023年
关键词
Device type classification; traffic behavior analysis; machine learning; deep learning;
D O I
10.1109/ICNC57223.2023.10074041
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Network operators play a fundamental role of providing network connectivity which fulfill service requirements of user devices. In the evolved 5G and 6G, the Internet of Things (IoT) is used for various purposes and the number of network connected devices is increasing. Typical types of connected devices in a network are not only IoT but also mobile phones and PCs, which may vary each access point or cell. For this reason, better network design and management requires awareness of connected device types based on traffic, service types, and surroundings. Possible approaches for device type classification can be categorized in two classes: analysis based on system logs and management databases; and analysis based on traffic contents and behavior in the network. However, data which network operators can collect is limited to traffic behavior because of privacy law and immature standardization of connected device-related data. Therefore, a new approach to classify device types in the network, whose connected devices are not limited to IoT, based on traffic behavior is necessary. This paper proposes a method to classify device types, such as hubs and cameras by analyzing only traffic behavior, without using traffic contents, in two stages. In the first stage, the proposed method classifies general device types, such as IoT and not IoT, by analyzing packet header statistics using machine learning. Then, in the second stage, the proposed method classifies connected devices that are classified as IoT in the first stage into IoT device types, by analyzing time series traffic behaviors using deep learning. We demonstrate that the proposed method classifies device type by analyzing real traffic dataset and outperforms the existing IoT-only device classification methods in terms of the number of types and the accuracy. The proposed method is suitable for automated network design, management, and control where a number of various devices are connected.
引用
收藏
页码:353 / 357
页数:5
相关论文
共 50 条
  • [21] Experiments with a Behavior-Based Robot
    Das, Barnali
    Ray, Dip Narayan
    Majumder, Somajyoti
    COMPUTER NETWORKS AND INFORMATION TECHNOLOGIES, 2011, 142 : 133 - 141
  • [22] Transparency of Behavior-Based Pricing
    Li, Xi
    Li, Krista J.
    Wang, Xin
    JOURNAL OF MARKETING RESEARCH, 2020, 57 (01) : 78 - 99
  • [23] The Perils of Behavior-Based Personalization
    Zhang, Juanjuan
    MARKETING SCIENCE, 2011, 30 (01) : 170 - 186
  • [24] Behavior-based algorithmic pricing
    Dubus, Antoine
    INFORMATION ECONOMICS AND POLICY, 2024, 66
  • [25] A behavior-based control architecture
    Stenzel, R
    SMC 2000 CONFERENCE PROCEEDINGS: 2000 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN & CYBERNETICS, VOL 1-5, 2000, : 3235 - 3240
  • [26] Institutionalizing Behavior-Based Privacy
    Demchak, Chris C.
    Fenstermacher, Kurt D.
    ADMINISTRATION & SOCIETY, 2009, 41 (07) : 783 - 814
  • [27] Behavior-based P2P Traffic Identification using Fuzzy Approach
    Reddy, Jagan Mohan
    Hota, Chittaranjan
    Rajarajan, Muttukrishnan
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT), 2015, : 152 - 155
  • [28] SuperB: Superior Behavior-based Anomaly Detection Defining Authorized Users' Traffic Patterns
    Karasek, Daniel Y.
    Kim, Jeehyeong
    Kemmoe, Victor Youdom
    Bhuiyan, Md Zakirul Alam
    Cho, Sunghyun
    Son, Junggab
    2020 29TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN 2020), 2020,
  • [29] Three-phase behavior-based detection and classification of known and unknown malware
    Lin, Ying-Dar
    Lai, Yuan-Cheng
    Lu, Chun-Nan
    Hsu, Peng-Kai
    Lee, Chia-Yin
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (11) : 2004 - 2015
  • [30] A Behavior-Based Method for Distinguishing the Type of C&C Channel
    Jiang, Jianguo
    Yin, Qilei
    Shi, Zhixin
    Xu, Guokun
    Kang, Xiaoyu
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING (ICA3PP 2019), PT I, 2020, 11944 : 624 - 636