Identification of Communication Devices from Analysis of Traffic Patterns

被引:0
|
作者
Kawai, Hiroki [1 ]
Ata, Shingo [1 ]
Nakamura, Nobuyuki [2 ]
Oka, Ikuo [1 ]
机构
[1] Osaka City Univ, Grad Sch Engn, Sumiyoshi Ku, 3-3-138 Sugimoto, Osaka 5588585, Japan
[2] Oki Elect Ind Co Ltd, Chuo Ku, 2-6-8 Bingomachi, Osaka 5410051, Japan
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Recently, variety of communication devices such as printers, IP telephones, network cameras are used widely, with the support of networking in consumer electronics. As a spread of IoT (Internet of Things), the number of embed devices are significantly increasing, however, such devices have lack of capability on security. It is therefore desirable that a network identifies these devices to take appropriate operations. In this paper, we propose an identification method of communication devices from monitoring patterns of traffic, here we use statistical metrics such as packet inter-arrival time or packet size, and we apply a machine learning for the identification. Through evaluations using real traffic, we show that our method can achieve over 90% of identification to 9 commiunication devices.
引用
收藏
页数:5
相关论文
共 50 条
  • [11] Object identification-based stall detection and stall legitimacy analysis for traffic patterns
    Saeed, Sana
    Bilal, Kashif
    Rehman, Zia Ur
    Azmat, Shoaib
    Shuja, Junaid
    Jamil, Akhtar
    JOURNAL OF ELECTRONIC IMAGING, 2022, 31 (06)
  • [12] Characterizing and Mining Traffic Patterns of IoT Devices in Edge Networks
    Wan, Yinxin
    Xu, Kuai
    Wang, Feng
    Xue, Guoliang
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2021, 8 (01): : 89 - 101
  • [13] On the identification and analysis of Skype traffic
    Molnar, Sandor
    Perenyi, Marcell
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2011, 24 (01) : 94 - 117
  • [14] Identification of Compromised IoT Devices: Combined Approach Based on Energy Consumption and Network Traffic Analysis
    Jaafar, Fehmi
    Ameyed, Darine
    Barrak, Amine
    Cheriet, Mohamed
    2021 IEEE 21ST INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS 2021), 2021, : 514 - 523
  • [15] Tor Traffic Analysis and Identification
    Mercaldo, Francesco
    Martinelli, Fabio
    2017 AEIT INTERNATIONAL ANNUAL CONFERENCE, 2017,
  • [16] A Traffic Analysis Perspective on Communication in the Brain
    Wolfson, Ouri
    Szczurek, Piotr
    Vijayan, Aishwarya
    Leow, Alex
    Ajilore, Olu
    2017 18TH IEEE INTERNATIONAL CONFERENCE ON MOBILE DATA MANAGEMENT (IEEE MDM 2017), 2017, : 206 - 211
  • [17] Identification of Traffic Congestion Patterns Using Connected Vehicle for Active Traffic Management
    Saha, Rajib
    Tariq, Mosammat Tahnin
    Hadi, Mohammed
    INTERNATIONAL CONFERENCE ON TRANSPORTATION AND DEVELOPMENT 2020 - TRAFFIC AND BIKE/PEDESTRIAN OPERATIONS, 2020, : 215 - 226
  • [18] Identification and Characterization of Traffic Flow Patterns for UTM application
    Alharbi, Abdulrahman
    Petrunin, Ivan
    Panagiotakopoulos, Dimitrios
    2021 IEEE/AIAA 40TH DIGITAL AVIONICS SYSTEMS CONFERENCE (DASC), 2021,
  • [19] Malicious Application Traffic Detection and Identification for Mobile Android Devices
    Niu, Geng
    INFORMATICA-AN INTERNATIONAL JOURNAL OF COMPUTING AND INFORMATICS, 2022, 46 (08): : 67 - 72
  • [20] Malicious Application Traffic Detection and Identification for Mobile Android Devices
    Niu, Geng
    Informatica (Slovenia), 2022, 46 (08): : 67 - 72