A Framework For Identification and Class
A Framework For Identification and Class
Research Article
A Framework for Identification and Classification of IoT
Devices for Security Analysis in Heterogeneous Network
Hafiz Muhammad Zahid,1 Yasir Saleem,1 Faisal Hayat,1 Farrukh Zeeshan Khan ,2
Roobaea Alroobaea ,3 Fahad Almansour,4 Muneer Ahmad ,5 and Ihsan Ali 6
1
Department of Computer Science & Engineering, University of Engineering and Technology, Lahore, Pakistan
2
Department of Computer Science, University of Engineering and Technology, Taxila, Pakistan
3
Department of Computer Science, College of Computers and Information Technology, Taif University, P. O. Box 11099,
Taif 21944, Saudi Arabia
4
Department of Computer Science, College of Sciences and Arts in Rass, Qassim University, Buraydah 51452, Saudi Arabia
5
School of Electrical Engineering and Computer Science (SEECS), National University of Sciences and Technology (NUST), Sector H-
12, 44000 Islamabad, Pakistan
6
Department of Computer System and Technology, Faculty of Computer Science and Information Technology, Universiti Malaya,
50603 Kuala Lumpur, Malaysia
Received 12 June 2021; Revised 22 December 2021; Accepted 19 March 2022; Published 26 April 2022
Copyright © 2022 Hafiz Muhammad Zahid et al. This is an open access article distributed under the Creative Commons
Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work
is properly cited.
Internet of Things (IoT) is a promising technology enabling physical devices like cameras, home appliances, and other devices to
communicate and interoperate with each other. The next wave transforms our homes, society, enterprises, and cities with the
massive presence of IoT devices. The devices in the Internet of Things (IoT) may exchange sensitive data, and an important
issue for any organization is to get the data secured and protected. The preliminary requirement for this is a mechanism
detecting and reporting anomalies automatically to some central controller. Therefore, this mechanism should be able to
classify legit IoT devices from unauthorized ones. Malicious IoT devices, non-IoT devices, and other types of man-in-the-
middle traffic sources must be quarantined for noncompliance. This helps formulate administrative policies and regulate/police
traffic in the network for better QoS management. This work proposed a framework-based hierarchical deep neural network
(HDNNs) to distinguish IoT devices from non-IoT devices using a feature set of IoT-specific traffic. A system has been
designed based on HDNN that classifies IoT devices to their specific categories and identifies new entrants with reasonable
accuracy. The results show that HDNN can distinguish IoT and non-IoT devices with higher accuracy and as well as classify
IoT devices into the respective classes with the required accuracy.
Telco
Wireless 3G/4G/LTE
Network
Wirless
Router Wifi
Hardware
Ethernet
Wifi
Hardware
Mesh
Internet Network
Modem Gateway
Data Corporation (IDC). The proliferation of IoT devices in devices use wireless links. These devices do not incorporate
IoT networks produces an operative challenge for adminis- robust security features because computation and power
trators. The heterogeneous nature of IoT networks in big cit- resources are limited [10]. Implementation of solid security
ies poses an additional asset management challenge as, in mechanisms is not possible due to the limited resources
this case, the nature of IoT devices is diverse, and various available and untrustful interaction with the environment.
departments install them. For instance, in such a heteroge- Considering the possibility of vulnerable IoT devices in an
neous network, light sensors can be fixed by the local council IoT network, there must be a robust security solution based
as shown in Figure 1. The local police division can install on patching the vulnerabilities from time to time [11].
cameras, and different garbage and sewage sensors can be Nowadays, different organizations also facilitate IoT
installed by the sanitation department. It is very difficult to device connectivity, which might obtrude security threats
identify the malfunctioning devices and their network loca- to their networks. Organizations must be capable of deter-
tion due to their invisibility [5]. mining the devices connected to their networks. They should
The absence of direct human involvement differentiates provide a mechanism for identifying whether the connected
the Internet of Things (IoT) from the traditional Internet. devices in their networks are legit and do not pose a risk or
An IoT device can generate information using changes in threat [12].
the environment around, analyze it, and act upon it autono- Analysis of real-time network traffic has been used in
mously, however, with a price considering the data privacy, several proposals for the identification of devices in general
security, and protection [6]. Researchers have warned of and for the classification of legit devices from nonlegit ones
the prospective risk of large numbers of unprotected devices [13]. We can state that network traffic traces have been
communicating on the Internet. Therefore, developers and proven to differentiate IoT devices from non-IoT devices
manufacturers have been struggling to develop a robust as there is a substantial difference in the data flow pattern
security system for IoT networks. In 2013, a researcher at of non-IoT devices compared to IoT devices. An IoT device
the dev environment in organizational security service dis- may work when some trigger occurs. For example, object-
covered the first IoT malware. According to the above anal- detecting sensors work only when someone is passing in
ysis, more than 25% of the malware consisted of devices front of the sensor. However, considering IoT device classi-
except for computers, such as smart cameras, smart TVs, fication alone, it is mostly very difficult to classify the net-
smartwatches, and other home appliances [7]. work traffic of a device into a fixed pattern and to create
Another problem is that the manufacturers of IoT an invariant profile even for the same types of IoT devices
devices do not provide regular updates for their devices such as Drop Camera and Withings Smart Baby Monitor
unless users initiate firmware updates, owing to constrained that are both cameras from different vendors or manufactur-
resources [8]. These devices cannot run full-fledged security ers. However, the traffic generated by these two cameras is
mechanisms. Therefore, IoT devices are prone to attacks (e. another pattern, as shown in Figure 2.
g., their default login passwords and unpatched bugs) for In another scenario, as shown in Figure 2, the traffic gen-
more extended periods [9]. erated from a Netatmo Weather Station is similar to the traf-
IoT devices work mainly in an unattended environment, fic generated by the baby monitor. Therefore, for a better
so there is a fair chance that an intruder may intentionally classification of devices communicating in the heteroge-
gain physical access to them. Resultantly, intruders may gain neous network, it is important to identify a pattern that
important information through a communication channel may help to place the devices in their respective category
by secretly listening to the conversation because most IoT even if the devices generate the same kind of data.
Wireless Communications and Mobile Computing 3
120000 8000
8000
7000
100000
6000 6000
Bytes
Bytes
Bytes
80000
5000
60000 4000
4000
40000
3000 2000
20000 2000
0
3:00 6:00 9:00 12:00 15:00 18:00 21:00 24:00 3:00 6:00 9:00 12:00 15:00 18:00 21:00 24:00 3:00 6:00 9:00 12:00 15:00 18:00 21:00 24:00
Time Time Time
were derived from first twenty packets of traffic flows. It was Pêgo and Nunes [20] developed an application to dis-
shown that the proposed framework with the combination cover the properties of a new device that can be used to
of both CNN and RNN was better in the perspective of decide the class of a device. This application automatically
detection than other alternative algorithms without the need creates an interface and the required integration drivers for
for any feature extraction or selection, which is mostly the new device. This paper’s key concern was to identify
required when using different machine learning models. the devices interacting within a network using the data
In [18, 19], the authors used a combination of flow level exchanged by IoT devices. Researchers found the accuracy
features with different types of packet-level aspects such as of different ML techniques for device discovery in the IoT
packet size, byte payload distribution, packet interarrival smart environment. This forwarded a step towards automa-
times, and TLS handshake metadata (cipher suite code) to tion of IoT devices in the IoT environment and reduced tra-
expand their work on the detection of malicious or illegal ditional device integration problems for platforms that
behavior on the network. Extraction of feature tools from bundle possible different IoT devices in an intelligent envi-
the network was developed by researchers and was launched ronment. The authors collected communication data by lis-
as an open-source tool for feature extraction. tening to smart environment traffic. This communication
data (communication files with XML format) was converted
2.2. Machine Learning Approaches for IoT Identification and to a database with information about each device in a smart
Classification. Falk and Fries [18] proposed different types of environment using an application developed in the iPhone
authentication methods as a source of device identification operating system (iOS) which applied different machine
and whitelisting (list of authorized devices). These methods learning algorithms like the Levenshtein distance algorithm,
were implemented for whitelisting in industrial automation TF-IDF tables, synonyms match, and finally and multi-
control systems (IACS). Researchers found that in the IACS property matching to discover the device that communi-
environment, the devices used in this domain were engaged cated in the IoT network correctly.
in a communication relation that is already known. There- Ferrando and Stacey [21] described the issues and chal-
fore, the whole complexity of the system can be fixed. lenges to secure IoT devices. The authors proposed an
Authors noticed that large-scale enterprise environments approach for security detection applied to data streams and
are dynamic where new types of devices were frequently classified threats in the early stages. This approach is a step
introduced. Thus, in this case, these methods can be failed. towards the novelty of securing IoT devices because this
Meidan et al. [19] applied the random forest (a machine technique can classify the traffic generated by sensors and
learning approach) to extract features from network traffic determine the diverse set of network anomalies. Researchers
data using feature extraction techniques as explained in [25] evaluated the method as anomaly detection based on data
to identify an unauthorized device from many devices based generated from a network device because most of the anom-
on a single TCP flow in intelligent environments. Researchers alies in network traffic data share-related attributes. The
collected data from 27 different IoT devices of nine different hypothesis was that noticing the distribution of features in
types and manually labelled the traffic data to train and evalu- network traffic was acceptable as examining the distributions
ate a multiclass classifier for every device type. It was shown of diagnostic power in the form of detection and classifica-
that it correctly discovered the unauthorized ninth device type tion of large categories of anomalies.
and identified the remaining eight types of devices as a partic- Shen et al. [22] explained how different supervised
ular type on the list of authorized (white list) device types. This machine learning techniques could be applied to analyze
multiclass classifier used approximately 300 features (packet data collected by listening to intelligent environment traffic
level and flow level). Among them, the essential attributes are and correctly identifying unauthorized IoT devices to pro-
lifetime minimum (TTL), median and average packets, the tect the private information of an organization.
ratio of total bytes transferred and received, the total number Researchers trained and evaluated a multiclass classifier
of packets with reloading tag settings (RST), and Alexa server on the collected and manually labeled dataset from net-
rank. This experiment’s limitations were that researchers clas- work traffic data of twenty-seven IoT devices of nine dif-
sified devices with specific device types, but there were many ferent types. They examined that it accurately identifies
device types with a single device in its category. In this way, the ninth type as unknown and the remaining belonged
it cannot be generalized. The second drawback of this experi- to authorized devices.
ment was that the devices were identified with each other, Suárez and Salcedo [23] applied different classification
but it was not for complex mixed real-time traffic. techniques such as K-means and ID3 on the dataset col-
Sivanathan et al. [5] proposed an approach for the clas- lected from twelve different devices such as cameras, lights,
sification of IoT and non-IoT devices using network traffic sensors, and fridges. They used twelve features extracted
data collected over 3 weeks. The authors applied a random from network communication data of IoT devices such as
forest multiclass classifier to 12 attributes extracted from the capacity of the battery, size of memory, internet band-
network traffic such as protocols, packet length, and port width required, gateway, Bluetooth enabled, etc. and deter-
number and obtained a good accuracy for classification. This mined four classes of devices using ML algorithms with the
method has the drawback that it must be trained for each help of similar features of these devices. K-mean was tested
device using network traces, and this is not a practical on three, four, and five clusters and grouped the devices into
approach for a large number of IoT devices in the commer- four categories such as mobile orchestrators, fixed orchestra-
cial market. tors, fixed followers, and dummy followers.
Wireless Communications and Mobile Computing 5
Lopez-Martin et al. [28] used deep learning approaches of hidden layers are fully connected to all neurodes of input
to classify the application layer protocols by using the fea- layers. Similarly, all neurodes of output layers are fully con-
tures extracted from the data of packets captured at layer nected to all neurodes of previously hidden layers. Hidden
3. Researchers tested the classification with many different layers are normally used for feature extraction or feature
sets of features, including both ports in some sets, win size, selection from features fed in the input layer. Neurodes in
and payload size. In this paper, it has been shown the possi- hidden layers act as feature detectors, and the number of
bility of using the traffic rate to classify and identify informa- hidden layers is increased; then hidden layers will be more
tion from network traffic. optimal and more important features to the output layer
Miettinen et al. [24] proposed a system capable of iden- for identification and Classification.
tifying the types of IoT devices automatically connected in In ANN, there are three layers which are as follows:
the IoT smart environment. The authors used fingerprint
classification that enabled enforcement of protocols and (i) Input layer (all inputs (features) provided to the
constraints to overcome damage as a result of unauthorized model through this layer)
access to the network. The proposed system imposes some
filtering traffic rules in the network to protect devices com- (ii) Hidden layer (maybe more than one depending
municating in the smart environment due to threats origi- upon the problem and used for processing the
nating from other highly risky devices in the network. The inputs received from the input layer)
designed method was attempted by researchers to separate (iii) Output layer (for prediction)
traffic for the IoT devices which were already seen in the net-
work. This method is impractical because many IoT devices The input layer is used for communication with the exter-
are being released every year. They have not used the nal environment that provides the pattern to the neural net-
method for mixed traffic generated from non-IoT devices. work. This layer works with independent variables, and the
This method provides a way to generate and collect data. neurons in this layer take decisions and fed them to the next
Cvitić et al. [25] proposed a novel technique for the hidden layer. The input layer must show the situation for
detection of distributed denial of services DDoS traffic gen- which we have been training the neural network. Every neu-
erated by IoT devices, and this approach worked as a con- ron in the input layer represents independent variables with
ceptual network model for anomaly detection. This model influence on the target variable in a neural network.
was based on the device classes and respective classes are This hidden layer has a collection of neurons with differ-
totally dependent on the traffic generated by these devices ent activation functions that can be applied to it, which can
separately. be found in between the input and output layers. It deals
In the last few years, different researchers worked on IoT with the input layer’s processed input, and its responsibility
device identification based on port information and MAC is just to extract the required features from the input data.
address. Nmap is an open-source tool that has robust func- There can be more than one hidden layer in DNN. The
tionality used to detect 2600 different versions of operating model’s accuracy can be increased by increasing the number
systems, but it is very difficult to guess the IoT device based of neurons in the network and additional layers are useful up
on port information when IoT devices use HTTP or HTTPS to a limit of 9-10. Accuracy may be constant or may be
ports as communication sources. Therefore, there must be a decreased as their predictive power can be declined. How-
robust framework to identify and classify IoT devices and ever, 3 to 10, mostly hidden layers, are being used nowadays.
their categories based on traffic patterns generated from dif- The number of neurons should be considered in each net-
ferent devices in heterogeneous networks [26]. work, as the number of neurons depends on the problems’
In this work, we have presented a framework that can complexity. If there are unnecessary neurons in the network,
discriminate between IoT devices from non-IoT devices then the model will lead to overfitting. If there are few neu-
and identify the type of IoT devices with the required accu- rons in the network, then these few neurons adequately
racy according to a given traffic session or sequence of detect the signal in the complex dataset.
sessions. The machine learning and deep learning models contain
two types of parameters (hyperparameters and model
3. Methodology parameters). Model parameters indicate how the input data
can be used to get desired output by learning at training time
This research employs deep learning with a collection of dif- whereas hyperparameters tell how our model can be defined
ferent algorithms such as DBN, convolutional neural net- at the start of training like how many hidden layers can be
work, and DNN, inspired by the brain’s functionality and used in ANN. These hyperparameters can be decided as a
structure. We have proposed a robust framework for IoT judgment of an expert and can be changed concerning time
device identification and classification based on hierarchical for optimization, and similarly, model parameters like
deep neural networks using the Keras framework [27]. A weights can be updated during backpropagation network
type of artificial neural network with one input layer for for strong relationship or better accuracy.
input variables and one hidden layer and one output layer The output layer receives the input from the hidden
is known as a shallow neural network [28]. DNN is similar layer and executes it for identification and classification. It
to the shallow neural network, but there is more than one will check the predicted output with actual outputs, and if
hidden layer of neurons that process the inputs. All neurodes the difference between predicted and actual output is very
6 Wireless Communications and Mobile Computing
Samsung
Belkin Philip hue Ihome Hue smart things
switch lightbulb power plug bridge
Netattmo
camera Drop
camera
Appliances
HP envey
Pixstar photo printer
frame Internet
Gateway
Triby Google
speaker cromecast Temparary
Analyzer
Non IoT Devices
Health Care Devices
Nest smoke
Withthigs scale Blipcare BP
alarm
monitor Laptop Computer
high, then this layer traces the information back to the input our dataset with the specific device, we have used SQL server
layer and adjusts the weights by using a backpropagation management studio. The dataset contains information about
network for every epoch. The number of neurons in the out- the network traffic stream of the devices that were used in
put layer must be according to the problem that is to be the testbed for the collection of the dataset in a smart
processed. environment.
In this part of the paper, we have covered how pcap files Using the large range of feature values in the data might
(Wireshark files) are converted into executable (CSV) for- lead to less accurate results and problems with the training.
mat. The dataset has been collected at the request of the Uni- Hence, we have decided to use the built-in MinMaxScaler
versity of New South Wales, Sydney (UNWS), Australia, as of the sklearn library in Python. This scaler can be used to
self-generated data in 28 pcap files collected from the testbed perform min-max scaling, which will lead to the state that
as a smart environment that has a number of IoT devices every value in the dataset is in the range (0, 1). We noticed
and non-IoT devices. The same dataset was employed by that after performing the feature scaling, the test set results
Bai et al. [13]. In the testbed, they used 28 IoT and non- were better because the accuracy can be increased after the
IoT devices for communication, and their data were scaling of features.
recorded under a synthesized network traffic trace for 6 Feature selection is one of the most important parts con-
months period. sidered in IoT traffic for machine learning algorithms
Figure 3 shows the devices IoT and non-IoT used in the because this technique gives the most important and rele-
testbed. vant features for target variables. Hence, the accuracy of
As a first step, we converted the pcap files into an execut- the model can be increased. Feature selection also helps to
able format (CSV format). For that purpose, the pcap files reduce “the curse of dimensionality” that is well-known
were transformed into CSV files using Python queries with and might cause the model to overfit or perform poorly. Dif-
83 generalized features followed by data labeling for IoT ferent machine learning algorithms do not often require fea-
device classification in a heterogeneous network. To label ture selection like decision tree (DT) and random forest
Wireless Communications and Mobile Computing 7
Features Description
Source MAC MAC address of the source
Source_port Port number of source
Dest_MAC MAC address of destination
Dest port Destination port number
Flow ID ID of network flow
Protocol Protocols for communication (6 and 17)
Tot forw pack Total forward packets
Flow duration Total duration of network flow
Tot Back pack Total number of packets backward
TotLen Bwd_Pkts Length of all backward packets
TotLen Fwd_Pkts Length of all forward packets
Forward_Pkt Len max Max length of a forward packet from forward packets
Forward_Pkt Len min Min length of a forward packet from forward packets
Forward_Pkt Len mean Mean of forward packets
Forward_Pkt Len Std STD of forward packets length
Backword_Pkt Len max Greater length of a backward packet from all backward packets
Backwaord_Pkt Len_mean Mean(average)length of backward packets
Backword_Pkt Len_Std STD of backward packets length
Flow_Byts/s Traffic flow in bytes/second
Flow_Pkts/s Packets flow/second
Forward_Header Len Length of header of forward packets
Backword_Header Len Length of header of backward packets
(RF). The reason is that the feature selection process is being The mathematical model of the proposed deep neural
done on the fly due to the way these models are being network is given below [29]:
trained (the “best” feature is selected at each split of the tree). !
However, some models may need feature selection to be per- n
formed to reach better results. In this work, we have used a ðx Þð jÞ
= f b + 〠 xi ð j−1Þ
× wi , ð1Þ
hierarchical deep neural network, so we have to perform fea- i=1
Start
Pcap files (Real time Input layer 22 300 500 300 150
capturing) neurons neurons neurons neurons neurons
Feature selection
No IOT
device?
Yes
Output as a IOT
specific class
End
same process can be used for all neurons of the output layer as Figure 4 shows the proposed methodology with two deep
well, and outputs of hidden layer neurons become the inputs neural networks for IoT device classification.
of the output layer and at the output layer; we have used sig- The second deep neural network is also expressed as
moid function which can map value between 0 and 1. !
n
1 ðxÞ = f b1 + 〠 xi ð j1−1Þ × wi ,
j1
100000
1.6e+04 2.4e+03
0
80000
Actual class
Scale
60000
40000
1.2e+04 1.2e+05
1
20000
0 1
Predicted class
2500
1.1e+02 3e+03 56 61 1.6e+02 21
1
2000
Actual class
20 58 2.7e+03 7 16 2.2e+02
2
Scale
1500
2 34 3 1.9e+02 11 81
3
1000
4 57 3 2 2.4e+02 1
4
500
6 8 16 3 1 3e+02
5
0 1 2 3 4 5
Predicted class
process will be repeated for all neurons of hidden layers and The error can be computed for each output neuron by
the output layer neurons. We can simplify Equation (1) as using the squared error function and summed to get the total
follows: error [30]:
n
net h1 = 〠 wi × xi + b: ð7Þ 1
i=1 ETotal = 〠 ðtarget − actualÞ2 : ð9Þ
2
After the net input of each hidden layer, neuron squashed
this net input using the logistic activation function to find the After getting the target value from the output of the output
output of each neuron of the hidden layer, this same process layer, we can calculate the error to adjust weights by using a
can be used for all neurons of the output layer as well, and backpropagation network.
the outputs of hidden layer neurons become the inputs of Table 2 shows the devices with their specific categories
the output layer; and at the output layer, we have used sigmoid and labels that we have used in our proposed method. This
function which can map value between 0 and 1. figure has not used the light bulb category in our proposed
model because there is only one device in this category.
1 Therefore, we have used only 6 categories for IoT devices
outh1 = : ð8Þ
1 + e−net h1 labeled 1-6.
Wireless Communications and Mobile Computing 11
Loss
1.2
1.0
0.8
0.6
0.4
0 20 40 60 80 100
Train_loss
Test_loss
Accuracy
0.8
0.7
0.6
0 20 40 60 80 100
Train
Test
Confusion matrix
0 16905 1428
True label
1 11748 117762
0 1
Predicted label
Model accuracy
0.8
Accuracy
0.6
0.4
0.2
Train
Test
model loss
6
loss 4
0
0 500 1000 1500 2000 2500 3000 3500
epoch
train
test
Model accuracy
0.8
Accuracy
0.6
0.4
0.2
Figure 12: Training and testing accuracy of the second-stage DNN for IoT device classification.
model loss
4
loss
0
0 500 1000 1500 2000 2500 3000 3500
epoch
train
test
Figure 9 shows the accuracy (0.9120) curve for training graph, along with the y-axis, the actual values are presented,
as well as for testing the accuracy of the first-stage deep neu- and along the x-axis, the predicted values are presented
ral network (DNN) used to discarnate IoT devices and non- within the range 0-5. Every value from 0 to 5 represents a
IoT devices. Figure 10 shows the loss curve for training as particular class. The accuracy of the model can be measured
well as for testing the loss of the first-stage deep neural net- as follows:
work (DNN) used to distinguish between IoT devices from
non-IoT devices.
Figure 11 shows the confusion matrix of the second- ðAll Right DignalsÞ
Accuracy =
stage deep neural network used for IoT device classification ðTotal Number of samplesÞ
using the heterogeneous network dataset. ð1666 + 3014 + 2701 + 201 + 245 + 696Þ
Figure 11 describes the confusion matrix of the second- =
9288
stage deep neural network with 4 hidden layers with a differ-
ent number of neurons for optimal hyperparameters. In this = 0:917958 ðOn unseen dataÞ,
Wireless Communications and Mobile Computing 15
[2] Z. Guan, J. Li, L. Wu, Y. Zhang, J. Wu, and X. Du, “Achieving applications,” International Journal on Advances in Security,
efficient and secure data acquisition for cloud-supported inter- vol. 8, no. 1 & 2, p. 2015, 2015.
net of things in smart grid,” IEEE Internet of Things Journal, [19] Y. Meidan, M. Bohadana, A. Shabtai et al., “Detection of unau-
vol. 4, no. 6, pp. 1934–1944, 2017. thorized IoT devices using machine learning techniques,”
[3] D. Yu, L. Zhang, Y. Chen, Y. Ma, and J. Chen, “Large-scale IoT 2017, http://arxiv.org/abs/1709.04647.
devices firmware identification based on weak password,” [20] P. R. J. Pêgo and L. Nunes, “Automatic discovery and classifi-
IEEE Access, vol. 8, pp. 7981–7992, 2020. cations of IoT devices,” in 2017 12th Iberian Conference on
[4] M. Jindal, J. Gupta, and B. Bhushan, “Machine learning Information Systems and Technologies (CISTI), Lisbon, Portu-
methods for IoT and their Future Applications,” in 2019 Inter- gal, 2017.
national Conference on Computing, Communication, and [21] R. Ferrando and P. Stacey, “Classification of device behaviour
Intelligent Systems (ICCCIS), pp. 430–434, Greater Noida, in internet of things infrastructures,” in Proceedings of the 1st
India, 2019. International Conference on Internet of Things and Machine
[5] A. Sivanathan, D. Sherratt, H. H. Gharakheili et al., “Charac- Learning, New York, 2017.
terizing and classifying IoT traffic in smart cities and cam- [22] J. Shen, Y. Li, B. Li, H. Chen, and J. Li, “IoT eye an efficient sys-
puses,” in 2017 IEEE Conference on Computer tem for dynamic IoT devices auto-discovery on organization
Communications Workshops (INFOCOM WKSHPS), level,” in 2017 IEEE 4th International Conference on Cyber
pp. 559–564, Atlanta, GA, USA, 2017. Security and Cloud Computing (CSCloud), pp. 294–299, New
[6] Y. Yang, L. Wu, G. Yin, L. Li, and H. Zhao, “A survey on secu- York, NY, USA, 2017.
rity and privacy issues in Internet-of-Things,” IEEE Internet of [23] J. N. Suárez and A. Salcedo, “ID3 and k-means Based method-
Things Journal, vol. 4, no. 5, pp. 1250–1258, 2017. ology for Internet of Things device classification,” in 2017
[7] B. Lam and C. Larose, How did the internet of things allow the International Conference on Mechatronics, Electronics and
latest attack on the internet?, Ed, 2016. Automotive Engineering (ICMEAE), pp. 129–133, Cuernavaca,
[8] A. Alkhalil and R. A. Ramadan, “IoT data provenance imple- Mexico, 2017.
mentation challenges,” Procedia Computer Science, vol. 109, [24] M. Miettinen, S. Marchal, I. Hafeez et al., “IoT sentinel demo:
pp. 1134–1139, 2017. automated device-type identification for security enforcement
[9] R. Roman, J. Zhou, and J. Lopez, “On the features and chal- in IoT,” in 2017 IEEE 37th International Conference on Distrib-
lenges of security and privacy in distributed internet of things,” uted Computing Systems (ICDCS), pp. 2511–2514, Atlanta,
Computer Networks, vol. 57, no. 10, pp. 2266–2279, 2013. GA, USA, 2017.
[10] M. A. Al-Garadi, A. Mohamed, A. Al-Ali, X. Du, and [25] I. Cvitić, D. Peraković, M. Periša, and M. Botica, “Novel
M. Guizani, “A survey of machine and deep learning methods approach for detection of IoT generated DDoS traffic,” Wire-
for Internet of Things (IoT) security,” 2018, http://arxiv.org/ less Networks, vol. 27, no. 3, pp. 1573–1586, 2021.
abs/1807.11023. [26] A. S. Hsu, Automatic Internet of Things device category identi-
[11] F. Meneghello, M. Calore, D. Zucchetto, M. Polese, and fication using traffic rates, Virginia Tech, 2019.
A. Zanella, “IoT: Internet of threats? A survey of practical [27] A. Radford, L. Metz, and S. Chintala, “Unsupervised represen-
security vulnerabilities in real IoT devices,” IEEE Internet of tation learning with deep convolutional generative adversarial
Things Journal, vol. 6, pp. 8182–8201, 2019. networks,” 2015, http://arxiv.org/1511.06434.
[12] M. Chiang and T. Zhang, “Fog and IoT: an overview of [28] M. Lopez-Martin, B. Carro, and A. Sanchez-Esguevillas, “IoT
research opportunities,” IEEE Internet of Things Journal, type-of-traffic forecasting method based on gradient boosting
vol. 3, no. 6, pp. 854–864, 2016. neural networks,” Future Generation Computer Systems,
[13] L. Bai, L. Yao, S. S. Kanhere, X. Wang, and Z. Yang, “Auto- vol. 105, pp. 331–345, 2020.
matic device classification from network traffic streams of [29] O. Salman, I. H. Elhajj, A. Chehab, and A. Kayssi, “A machine
internet of things,” in 2018 IEEE 43rd Conference on Local learning based framework for IoT device identification and
Computer Networks (LCN), Chicago, IL, USA, 2018. abnormal traffic detection,” Transactions on Emerging Tele-
[14] P. Bajpai, A. K. Sood, and R. J. Enbody, “The art of mapping communications Technologies, vol. 33, no. 3, article e3743,
IoT devices in networks,” Network Security, vol. 2018, no. 4, 2022.
pp. 8–15, 2018. [30] I. Cvitić, D. Peraković, B. Gupta, and K.-K. R. Choo, “Boost-
[15] A. Sivanathan, H. H. Gharakheili, F. Loi et al., “Classifying IoT ing-based DDoS detection in Internet of Things systems,”
devices in smart environments using network traffic character- IEEE Internet of Things Journal, vol. 9, no. 3, pp. 2109–2123,
istics,” IEEE Transactions on Mobile Computing, vol. 18, no. 8, 2022.
pp. 1745–1759, 2019.
[16] A. Sivanathan, H. H. Gharakheili, and V. Sivaraman, “Manag-
ing IoT cyber-security using programmable telemetry and
machine learning,” IEEE Transactions on Network and Service
Management, vol. 17, no. 1, pp. 60–74, 2020.
[17] M. Lopez-Martin, B. Carro, A. Sanchez-Esguevillas, and
J. Lloret, “Network traffic classifier with convolutional and
recurrent neural networks for internet of things,” IEEE Access,
vol. 5, pp. 18042–18050, 2017.
[18] R. Falk and S. Fries, “Using managed certificate whitelisting as
a basis for internet of things security in industrial automation