0% found this document useful (0 votes)
27 views16 pages

A Framework For Identification and Class

Uploaded by

xenaman17
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views16 pages

A Framework For Identification and Class

Uploaded by

xenaman17
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

Hindawi

Wireless Communications and Mobile Computing


Volume 2022, Article ID 8806184, 16 pages
https://doi.org/10.1155/2022/8806184

Research Article
A Framework for Identification and Classification of IoT
Devices for Security Analysis in Heterogeneous Network

Hafiz Muhammad Zahid,1 Yasir Saleem,1 Faisal Hayat,1 Farrukh Zeeshan Khan ,2
Roobaea Alroobaea ,3 Fahad Almansour,4 Muneer Ahmad ,5 and Ihsan Ali 6
1
Department of Computer Science & Engineering, University of Engineering and Technology, Lahore, Pakistan
2
Department of Computer Science, University of Engineering and Technology, Taxila, Pakistan
3
Department of Computer Science, College of Computers and Information Technology, Taif University, P. O. Box 11099,
Taif 21944, Saudi Arabia
4
Department of Computer Science, College of Sciences and Arts in Rass, Qassim University, Buraydah 51452, Saudi Arabia
5
School of Electrical Engineering and Computer Science (SEECS), National University of Sciences and Technology (NUST), Sector H-
12, 44000 Islamabad, Pakistan
6
Department of Computer System and Technology, Faculty of Computer Science and Information Technology, Universiti Malaya,
50603 Kuala Lumpur, Malaysia

Correspondence should be addressed to Ihsan Ali; [email protected]

Received 12 June 2021; Revised 22 December 2021; Accepted 19 March 2022; Published 26 April 2022

Academic Editor: Antonio Guerrieri

Copyright © 2022 Hafiz Muhammad Zahid et al. This is an open access article distributed under the Creative Commons
Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work
is properly cited.

Internet of Things (IoT) is a promising technology enabling physical devices like cameras, home appliances, and other devices to
communicate and interoperate with each other. The next wave transforms our homes, society, enterprises, and cities with the
massive presence of IoT devices. The devices in the Internet of Things (IoT) may exchange sensitive data, and an important
issue for any organization is to get the data secured and protected. The preliminary requirement for this is a mechanism
detecting and reporting anomalies automatically to some central controller. Therefore, this mechanism should be able to
classify legit IoT devices from unauthorized ones. Malicious IoT devices, non-IoT devices, and other types of man-in-the-
middle traffic sources must be quarantined for noncompliance. This helps formulate administrative policies and regulate/police
traffic in the network for better QoS management. This work proposed a framework-based hierarchical deep neural network
(HDNNs) to distinguish IoT devices from non-IoT devices using a feature set of IoT-specific traffic. A system has been
designed based on HDNN that classifies IoT devices to their specific categories and identifies new entrants with reasonable
accuracy. The results show that HDNN can distinguish IoT and non-IoT devices with higher accuracy and as well as classify
IoT devices into the respective classes with the required accuracy.

1. Introduction IoT devices are usually part of a heterogeneous network


providing valuable services to society. The communication
In the modern age, billions of devices such as home appli- between these devices also facilitates aggregating and processing
ances, traffic lights, and lampposts are connected to the data and reacting to the environment’s changes automatically.
Internet, also known as the Internet of Things (IoT) [1]. These devices are sometimes involved in sharing enormous
These devices, called IoT devices, have several sensors that data, forming a network that shares data at extremely high rates
generate valuable data. Communication among them is done throughout and in a continuous fashion [4].
under different protocols such as Wi-Fi, Bluetooth, ZigBee, According to the reports of the International Data Cor-
and Ethernet, which helps IoT devices increase their func- poration (IDC), the number of IoT devices will reach 41 bil-
tionality using actuators [2, 3] sometimes. lion by 2020, according to the report of the International
2 Wireless Communications and Mobile Computing

Internet Origination Points Internet Network Devices IoT Devices

Telco
Wireless 3G/4G/LTE
Network

Wirless
Router Wifi
Hardware

Ethernet

Wifi
Hardware
Mesh
Internet Network
Modem Gateway

Figure 1: A heterogeneous network.

Data Corporation (IDC). The proliferation of IoT devices in devices use wireless links. These devices do not incorporate
IoT networks produces an operative challenge for adminis- robust security features because computation and power
trators. The heterogeneous nature of IoT networks in big cit- resources are limited [10]. Implementation of solid security
ies poses an additional asset management challenge as, in mechanisms is not possible due to the limited resources
this case, the nature of IoT devices is diverse, and various available and untrustful interaction with the environment.
departments install them. For instance, in such a heteroge- Considering the possibility of vulnerable IoT devices in an
neous network, light sensors can be fixed by the local council IoT network, there must be a robust security solution based
as shown in Figure 1. The local police division can install on patching the vulnerabilities from time to time [11].
cameras, and different garbage and sewage sensors can be Nowadays, different organizations also facilitate IoT
installed by the sanitation department. It is very difficult to device connectivity, which might obtrude security threats
identify the malfunctioning devices and their network loca- to their networks. Organizations must be capable of deter-
tion due to their invisibility [5]. mining the devices connected to their networks. They should
The absence of direct human involvement differentiates provide a mechanism for identifying whether the connected
the Internet of Things (IoT) from the traditional Internet. devices in their networks are legit and do not pose a risk or
An IoT device can generate information using changes in threat [12].
the environment around, analyze it, and act upon it autono- Analysis of real-time network traffic has been used in
mously, however, with a price considering the data privacy, several proposals for the identification of devices in general
security, and protection [6]. Researchers have warned of and for the classification of legit devices from nonlegit ones
the prospective risk of large numbers of unprotected devices [13]. We can state that network traffic traces have been
communicating on the Internet. Therefore, developers and proven to differentiate IoT devices from non-IoT devices
manufacturers have been struggling to develop a robust as there is a substantial difference in the data flow pattern
security system for IoT networks. In 2013, a researcher at of non-IoT devices compared to IoT devices. An IoT device
the dev environment in organizational security service dis- may work when some trigger occurs. For example, object-
covered the first IoT malware. According to the above anal- detecting sensors work only when someone is passing in
ysis, more than 25% of the malware consisted of devices front of the sensor. However, considering IoT device classi-
except for computers, such as smart cameras, smart TVs, fication alone, it is mostly very difficult to classify the net-
smartwatches, and other home appliances [7]. work traffic of a device into a fixed pattern and to create
Another problem is that the manufacturers of IoT an invariant profile even for the same types of IoT devices
devices do not provide regular updates for their devices such as Drop Camera and Withings Smart Baby Monitor
unless users initiate firmware updates, owing to constrained that are both cameras from different vendors or manufactur-
resources [8]. These devices cannot run full-fledged security ers. However, the traffic generated by these two cameras is
mechanisms. Therefore, IoT devices are prone to attacks (e. another pattern, as shown in Figure 2.
g., their default login passwords and unpatched bugs) for In another scenario, as shown in Figure 2, the traffic gen-
more extended periods [9]. erated from a Netatmo Weather Station is similar to the traf-
IoT devices work mainly in an unattended environment, fic generated by the baby monitor. Therefore, for a better
so there is a fair chance that an intruder may intentionally classification of devices communicating in the heteroge-
gain physical access to them. Resultantly, intruders may gain neous network, it is important to identify a pattern that
important information through a communication channel may help to place the devices in their respective category
by secretly listening to the conversation because most IoT even if the devices generate the same kind of data.
Wireless Communications and Mobile Computing 3

Drop_Camera Baby_Monitor Netamo_Weather

140000 9000 10000

120000 8000
8000
7000
100000
6000 6000
Bytes

Bytes

Bytes
80000
5000
60000 4000
4000
40000
3000 2000

20000 2000
0

3:00 6:00 9:00 12:00 15:00 18:00 21:00 24:00 3:00 6:00 9:00 12:00 15:00 18:00 21:00 24:00 3:00 6:00 9:00 12:00 15:00 18:00 21:00 24:00
Time Time Time

Figure 2: Daily traffic volume from three IoT devices [13].

IDE identification and classification of IoT devices in a 2. Literature Review


heterogeneous network have been proposed based on port
information, protocol, and MAC address [14]. By using IoT is a network in which physical devices with sensors, soft-
the prefix (organization unique identifier (OUI)) of a ware, and some other technologies act as tiny computers.
MAC address, it is easy to identify the manufacturer of These devices can collect data from the environment and pro-
the device, but this information is not enough to guess cess the data and then send this data to other devices with the
the device functionality as many manufacturers produce help of internet connectivity. The exponential growth of IoT
diverse nature of devices. Additionally, manufacturers of devices like smartwatches, smart cameras, lights, sensors,
different IoT devices may buy NICs from a third party, energy management devices, and other different types of
and it is impossible to know about IoT devices just by devices in the intelligent environment has gained a ballistic
using the prefix (OUI) of the MAC address. Another interest of researchers to develop improved frameworks using
aspect is this: The MAC address of IoT devices may even ML and DL approaches to provide better services to human-
be spoofed [15]. kind in their lives. Researchers from different fields such as
In the recent past, multiple researchers have put for- computer science, electrical, and other disciplines have paid
ward many methods for automatic identification and clas- great efforts to deal with this exponential growth. They are
sification of IoT devices with some constraints or rules concerned about finding automated approaches for the secu-
[16]. These proposals mainly focused on the identification rity of IoT systems. In this section, we have covered closely
and classification of those IoT devices which have already related work done by different researchers on IoT for different
been identified as part of the network under study. How- categories, including IoT device identification, time-series data
ever, there is no proposal to identify and classify new classification, and network traffic analysis using the manual as
devices entering the network. For example, when an well as ML and DL approaches.
unknown IP-based camera enters the network, it can be A lot of work has been done by researchers for character-
not easy to identify and classify it based on the previous izing internet traffic from 2005 to 2012. This work is primar-
IP base camera records. ily focused on web application detection such as Skype, mail,
Based on the discussion above, there is a need to build web browsing, and peer-to-peer applications but character-
a holistic security solution for IoT networks. The prelimi- ized IoT device traffic commonly known as mobile to mobile
nary requirement for this is the identification and classifi- communication (M2M).
cation of connected and incoming devices. In this paper,
the challenge of identification and classification of IoT 2.1. Machine Learning Approaches for Traffic Analyses.
devices in the heterogeneous network has been taken up. Much work has been done over the last few years using dif-
We have used real-time network traffic and developed a ferent types of machine learning and deep learning algo-
method to differentiate IoT devices from non-IoT devices rithms to classify traffic applications for specific computers
as well as classify IoT devices into their respective catego- and identify malware and botnets in the networks.
ries. IP addresses have not been used as a parameter. The Lopez-Martin et al. [17] proposed a framework for a net-
reason is this: IP addresses can be spoofed very easily. We work traffic classifier (NTC) using a combination of DL
have used network traffic statistics and necessary metadata models, CNN, and RNN. This framework was used to clas-
instead of relying on the deep packet inspection and pro- sify traffic flows like HTTP, SMTP, Telnet, YouTube, QUIC,
posed a hierarchical deep neural network (HDNN) frame- and Office365 with six different features of traffic such as
work that can discriminate between IoT devices from non- source port number, port number of destination, payload
IoT devices and also identify the type of IoT devices with volume, transport control protocol (TCP) window size,
reasonable accuracy. interarrival time, and direction of traffic, and these features
4 Wireless Communications and Mobile Computing

were derived from first twenty packets of traffic flows. It was Pêgo and Nunes [20] developed an application to dis-
shown that the proposed framework with the combination cover the properties of a new device that can be used to
of both CNN and RNN was better in the perspective of decide the class of a device. This application automatically
detection than other alternative algorithms without the need creates an interface and the required integration drivers for
for any feature extraction or selection, which is mostly the new device. This paper’s key concern was to identify
required when using different machine learning models. the devices interacting within a network using the data
In [18, 19], the authors used a combination of flow level exchanged by IoT devices. Researchers found the accuracy
features with different types of packet-level aspects such as of different ML techniques for device discovery in the IoT
packet size, byte payload distribution, packet interarrival smart environment. This forwarded a step towards automa-
times, and TLS handshake metadata (cipher suite code) to tion of IoT devices in the IoT environment and reduced tra-
expand their work on the detection of malicious or illegal ditional device integration problems for platforms that
behavior on the network. Extraction of feature tools from bundle possible different IoT devices in an intelligent envi-
the network was developed by researchers and was launched ronment. The authors collected communication data by lis-
as an open-source tool for feature extraction. tening to smart environment traffic. This communication
data (communication files with XML format) was converted
2.2. Machine Learning Approaches for IoT Identification and to a database with information about each device in a smart
Classification. Falk and Fries [18] proposed different types of environment using an application developed in the iPhone
authentication methods as a source of device identification operating system (iOS) which applied different machine
and whitelisting (list of authorized devices). These methods learning algorithms like the Levenshtein distance algorithm,
were implemented for whitelisting in industrial automation TF-IDF tables, synonyms match, and finally and multi-
control systems (IACS). Researchers found that in the IACS property matching to discover the device that communi-
environment, the devices used in this domain were engaged cated in the IoT network correctly.
in a communication relation that is already known. There- Ferrando and Stacey [21] described the issues and chal-
fore, the whole complexity of the system can be fixed. lenges to secure IoT devices. The authors proposed an
Authors noticed that large-scale enterprise environments approach for security detection applied to data streams and
are dynamic where new types of devices were frequently classified threats in the early stages. This approach is a step
introduced. Thus, in this case, these methods can be failed. towards the novelty of securing IoT devices because this
Meidan et al. [19] applied the random forest (a machine technique can classify the traffic generated by sensors and
learning approach) to extract features from network traffic determine the diverse set of network anomalies. Researchers
data using feature extraction techniques as explained in [25] evaluated the method as anomaly detection based on data
to identify an unauthorized device from many devices based generated from a network device because most of the anom-
on a single TCP flow in intelligent environments. Researchers alies in network traffic data share-related attributes. The
collected data from 27 different IoT devices of nine different hypothesis was that noticing the distribution of features in
types and manually labelled the traffic data to train and evalu- network traffic was acceptable as examining the distributions
ate a multiclass classifier for every device type. It was shown of diagnostic power in the form of detection and classifica-
that it correctly discovered the unauthorized ninth device type tion of large categories of anomalies.
and identified the remaining eight types of devices as a partic- Shen et al. [22] explained how different supervised
ular type on the list of authorized (white list) device types. This machine learning techniques could be applied to analyze
multiclass classifier used approximately 300 features (packet data collected by listening to intelligent environment traffic
level and flow level). Among them, the essential attributes are and correctly identifying unauthorized IoT devices to pro-
lifetime minimum (TTL), median and average packets, the tect the private information of an organization.
ratio of total bytes transferred and received, the total number Researchers trained and evaluated a multiclass classifier
of packets with reloading tag settings (RST), and Alexa server on the collected and manually labeled dataset from net-
rank. This experiment’s limitations were that researchers clas- work traffic data of twenty-seven IoT devices of nine dif-
sified devices with specific device types, but there were many ferent types. They examined that it accurately identifies
device types with a single device in its category. In this way, the ninth type as unknown and the remaining belonged
it cannot be generalized. The second drawback of this experi- to authorized devices.
ment was that the devices were identified with each other, Suárez and Salcedo [23] applied different classification
but it was not for complex mixed real-time traffic. techniques such as K-means and ID3 on the dataset col-
Sivanathan et al. [5] proposed an approach for the clas- lected from twelve different devices such as cameras, lights,
sification of IoT and non-IoT devices using network traffic sensors, and fridges. They used twelve features extracted
data collected over 3 weeks. The authors applied a random from network communication data of IoT devices such as
forest multiclass classifier to 12 attributes extracted from the capacity of the battery, size of memory, internet band-
network traffic such as protocols, packet length, and port width required, gateway, Bluetooth enabled, etc. and deter-
number and obtained a good accuracy for classification. This mined four classes of devices using ML algorithms with the
method has the drawback that it must be trained for each help of similar features of these devices. K-mean was tested
device using network traces, and this is not a practical on three, four, and five clusters and grouped the devices into
approach for a large number of IoT devices in the commer- four categories such as mobile orchestrators, fixed orchestra-
cial market. tors, fixed followers, and dummy followers.
Wireless Communications and Mobile Computing 5

Lopez-Martin et al. [28] used deep learning approaches of hidden layers are fully connected to all neurodes of input
to classify the application layer protocols by using the fea- layers. Similarly, all neurodes of output layers are fully con-
tures extracted from the data of packets captured at layer nected to all neurodes of previously hidden layers. Hidden
3. Researchers tested the classification with many different layers are normally used for feature extraction or feature
sets of features, including both ports in some sets, win size, selection from features fed in the input layer. Neurodes in
and payload size. In this paper, it has been shown the possi- hidden layers act as feature detectors, and the number of
bility of using the traffic rate to classify and identify informa- hidden layers is increased; then hidden layers will be more
tion from network traffic. optimal and more important features to the output layer
Miettinen et al. [24] proposed a system capable of iden- for identification and Classification.
tifying the types of IoT devices automatically connected in In ANN, there are three layers which are as follows:
the IoT smart environment. The authors used fingerprint
classification that enabled enforcement of protocols and (i) Input layer (all inputs (features) provided to the
constraints to overcome damage as a result of unauthorized model through this layer)
access to the network. The proposed system imposes some
filtering traffic rules in the network to protect devices com- (ii) Hidden layer (maybe more than one depending
municating in the smart environment due to threats origi- upon the problem and used for processing the
nating from other highly risky devices in the network. The inputs received from the input layer)
designed method was attempted by researchers to separate (iii) Output layer (for prediction)
traffic for the IoT devices which were already seen in the net-
work. This method is impractical because many IoT devices The input layer is used for communication with the exter-
are being released every year. They have not used the nal environment that provides the pattern to the neural net-
method for mixed traffic generated from non-IoT devices. work. This layer works with independent variables, and the
This method provides a way to generate and collect data. neurons in this layer take decisions and fed them to the next
Cvitić et al. [25] proposed a novel technique for the hidden layer. The input layer must show the situation for
detection of distributed denial of services DDoS traffic gen- which we have been training the neural network. Every neu-
erated by IoT devices, and this approach worked as a con- ron in the input layer represents independent variables with
ceptual network model for anomaly detection. This model influence on the target variable in a neural network.
was based on the device classes and respective classes are This hidden layer has a collection of neurons with differ-
totally dependent on the traffic generated by these devices ent activation functions that can be applied to it, which can
separately. be found in between the input and output layers. It deals
In the last few years, different researchers worked on IoT with the input layer’s processed input, and its responsibility
device identification based on port information and MAC is just to extract the required features from the input data.
address. Nmap is an open-source tool that has robust func- There can be more than one hidden layer in DNN. The
tionality used to detect 2600 different versions of operating model’s accuracy can be increased by increasing the number
systems, but it is very difficult to guess the IoT device based of neurons in the network and additional layers are useful up
on port information when IoT devices use HTTP or HTTPS to a limit of 9-10. Accuracy may be constant or may be
ports as communication sources. Therefore, there must be a decreased as their predictive power can be declined. How-
robust framework to identify and classify IoT devices and ever, 3 to 10, mostly hidden layers, are being used nowadays.
their categories based on traffic patterns generated from dif- The number of neurons should be considered in each net-
ferent devices in heterogeneous networks [26]. work, as the number of neurons depends on the problems’
In this work, we have presented a framework that can complexity. If there are unnecessary neurons in the network,
discriminate between IoT devices from non-IoT devices then the model will lead to overfitting. If there are few neu-
and identify the type of IoT devices with the required accu- rons in the network, then these few neurons adequately
racy according to a given traffic session or sequence of detect the signal in the complex dataset.
sessions. The machine learning and deep learning models contain
two types of parameters (hyperparameters and model
3. Methodology parameters). Model parameters indicate how the input data
can be used to get desired output by learning at training time
This research employs deep learning with a collection of dif- whereas hyperparameters tell how our model can be defined
ferent algorithms such as DBN, convolutional neural net- at the start of training like how many hidden layers can be
work, and DNN, inspired by the brain’s functionality and used in ANN. These hyperparameters can be decided as a
structure. We have proposed a robust framework for IoT judgment of an expert and can be changed concerning time
device identification and classification based on hierarchical for optimization, and similarly, model parameters like
deep neural networks using the Keras framework [27]. A weights can be updated during backpropagation network
type of artificial neural network with one input layer for for strong relationship or better accuracy.
input variables and one hidden layer and one output layer The output layer receives the input from the hidden
is known as a shallow neural network [28]. DNN is similar layer and executes it for identification and classification. It
to the shallow neural network, but there is more than one will check the predicted output with actual outputs, and if
hidden layer of neurons that process the inputs. All neurodes the difference between predicted and actual output is very
6 Wireless Communications and Mobile Computing

Energy management Controllers/Hubs Cameras

LIFX Amazon Samsung smart TP link Belkin


Belkin motion TP Link power camera
Light bulb sensor plug echo camera camera

Samsung
Belkin Philip hue Ihome Hue smart things
switch lightbulb power plug bridge
Netattmo
camera Drop
camera
Appliances

HP envey
Pixstar photo printer
frame Internet

Gateway

Triby Google
speaker cromecast Temparary
Analyzer
Non IoT Devices
Health Care Devices

Netatmo Awair air quality


weather station monitor
Wireless
Smart phone
Tablet Wired

Nest smoke
Withthigs scale Blipcare BP
alarm
monitor Laptop Computer

Figure 3: Testbed architecture for IoT and non-IoT devices.

high, then this layer traces the information back to the input our dataset with the specific device, we have used SQL server
layer and adjusts the weights by using a backpropagation management studio. The dataset contains information about
network for every epoch. The number of neurons in the out- the network traffic stream of the devices that were used in
put layer must be according to the problem that is to be the testbed for the collection of the dataset in a smart
processed. environment.
In this part of the paper, we have covered how pcap files Using the large range of feature values in the data might
(Wireshark files) are converted into executable (CSV) for- lead to less accurate results and problems with the training.
mat. The dataset has been collected at the request of the Uni- Hence, we have decided to use the built-in MinMaxScaler
versity of New South Wales, Sydney (UNWS), Australia, as of the sklearn library in Python. This scaler can be used to
self-generated data in 28 pcap files collected from the testbed perform min-max scaling, which will lead to the state that
as a smart environment that has a number of IoT devices every value in the dataset is in the range (0, 1). We noticed
and non-IoT devices. The same dataset was employed by that after performing the feature scaling, the test set results
Bai et al. [13]. In the testbed, they used 28 IoT and non- were better because the accuracy can be increased after the
IoT devices for communication, and their data were scaling of features.
recorded under a synthesized network traffic trace for 6 Feature selection is one of the most important parts con-
months period. sidered in IoT traffic for machine learning algorithms
Figure 3 shows the devices IoT and non-IoT used in the because this technique gives the most important and rele-
testbed. vant features for target variables. Hence, the accuracy of
As a first step, we converted the pcap files into an execut- the model can be increased. Feature selection also helps to
able format (CSV format). For that purpose, the pcap files reduce “the curse of dimensionality” that is well-known
were transformed into CSV files using Python queries with and might cause the model to overfit or perform poorly. Dif-
83 generalized features followed by data labeling for IoT ferent machine learning algorithms do not often require fea-
device classification in a heterogeneous network. To label ture selection like decision tree (DT) and random forest
Wireless Communications and Mobile Computing 7

Table 1: Optimal features after recursive feature elimination.

Features Description
Source MAC MAC address of the source
Source_port Port number of source
Dest_MAC MAC address of destination
Dest port Destination port number
Flow ID ID of network flow
Protocol Protocols for communication (6 and 17)
Tot forw pack Total forward packets
Flow duration Total duration of network flow
Tot Back pack Total number of packets backward
TotLen Bwd_Pkts Length of all backward packets
TotLen Fwd_Pkts Length of all forward packets
Forward_Pkt Len max Max length of a forward packet from forward packets
Forward_Pkt Len min Min length of a forward packet from forward packets
Forward_Pkt Len mean Mean of forward packets
Forward_Pkt Len Std STD of forward packets length
Backword_Pkt Len max Greater length of a backward packet from all backward packets
Backwaord_Pkt Len_mean Mean(average)length of backward packets
Backword_Pkt Len_Std STD of backward packets length
Flow_Byts/s Traffic flow in bytes/second
Flow_Pkts/s Packets flow/second
Forward_Header Len Length of header of forward packets
Backword_Header Len Length of header of backward packets

(RF). The reason is that the feature selection process is being The mathematical model of the proposed deep neural
done on the fly due to the way these models are being network is given below [29]:
trained (the “best” feature is selected at each split of the tree). !
However, some models may need feature selection to be per- n
formed to reach better results. In this work, we have used a ðx Þð jÞ
= f b + 〠 xi ð j−1Þ
× wi , ð1Þ
hierarchical deep neural network, so we have to perform fea- i=1

ture selection for that purpose. We have used different fea-  


ture selection methods, but the recursive feature Pt = Sof tMax xð jÞ , ð2Þ
elimination (RFE) selected important and optimal features
which we have used in our training dataset for the proposed where b is bias, x is a vector that has input to the input layer,
framework. The features gave better results instead of other w is weights, n is the number of previous layer inputs, j is the
features. number of hidden layers, P is a vector which has probability
Table 1 shows the most important and optimal features. after SoftMax, and t represents the number of values in the P
vector, if P1 > P2 .
3.1. Experimental Evaluation We find the total input for each neuron of the hidden
layer and squash the total net input using the sigmoid activa-
3.1.1. Identification and Classification of Devices. To identify tion function or logistic activation function. For the hidden
and classify IoT devices for security analysis in heteroge- layer, we have used the logistic activation function, and this
neous networks, we have proposed an end-to-end robust same process will be repeated for all neurons of hidden
framework based on hierarchical deep neural networks. layers and the output layer neurons. We can simplify Equa-
Our proposed method is actually in two stages. In the first tion (1) as follows:
stage, we have used a deep neural network with one input
layer, 4 hidden layers, and one output layer, all layers are n
fully connected, and it is used to distinguish between IoT net h1 = 〠 wi × xi + b: ð3Þ
devices from non-IoT devices such as laptops, MacBook, i=1
and Samsung Galaxy Tab. In the second stage, we have used
a second deep neural network with 4 hidden layers with a After the net input of each hidden layer, the neuron then
different number of neurons, and it is used to classify IoT squashes this net input using the logistic activation function
devices into their respective classes. to find the output of each neuron of the hidden layer, this
8 Wireless Communications and Mobile Computing

Start

Pcap files (Real time Input layer 22 300 500 300 150
capturing) neurons neurons neurons neurons neurons

Convert into readable 2 neurons


format (Using python output layer
queries)

Database format and


labeling

Data analysis and


preprocessing

Feature selection

Build a DNN with 4


hidden layer

500 700 500 300 Output layer


Complete the DNN Input layer neurons neurons neurons neurons 4 neurons
training 22
neurons

No IOT
device?

Yes

Build another DNN


with 7 hidden layer

Complete the DNN


training

Output as a IOT
specific class

End

Figure 4: Proposed methodology with two DNNs.

same process can be used for all neurons of the output layer as Figure 4 shows the proposed methodology with two deep
well, and outputs of hidden layer neurons become the inputs neural networks for IoT device classification.
of the output layer and at the output layer; we have used sig- The second deep neural network is also expressed as
moid function which can map value between 0 and 1. !
n

1 ðxÞ = f b1 + 〠 xi ð j1−1Þ × wi ,
j1

out h1 = : ð4Þ i=1 ð6Þ


1 + e−neth1  
ð j1Þ
Pt1 = Sof tMax x ,
The error can be computed for each output neuron by
using the squared error function and summed to get the total
where b1 is bias, x is a vector that has input to the input
error:
layer, w is weights, n is the number of previous layer inputs,
j is number of hidden layers, P is a vector which has proba-
1 bility after SoftMax, and t1 represents the number of values
ETotal = 〠 ðtarget − actualÞ2 : ð5Þ
2 in the P vector.
We find the total input for each neuron of hidden layer
After getting the target value from the output of the output and squash the total net input using the sigmoid activation
layer, we can calculate the error to adjust weights by using a function or logistic activation function. For the hidden layer,
backpropagation network. we have used the logistic activation function, and this same
Wireless Communications and Mobile Computing 9

Table 2: List of devices with labelled data.

Category Device name Label Connection type


Samsung smart things Wired connection
Controllers and hubs 1
Amazon Echo Wireless connection
Netatmo camera Wireless connection
Belkin camera Wireless
Cameras Samsung smart camera 2 Wireless
Drop camera Wireless
TP-Link camera Wireless
iHome power plug Wireless
Philip hue light bulb Wireless
Switches and triggers 3
Belkin switch Wireless
TP-link power plug Wireless
Netatmo weather station Wireless
Awair air quality monitor 4 Wireless
Healthcare devices
Nest smoke alarm Wireless
With things scale 4 Wireless
Google Chromecast Wireless
Electronics HP envy printer 5 Wireless
Triby speaker Wireless
Router Bridge LAN (gateway) TP-Link router 6 Wired/wireless

Table 3: Nonoptimal hyperparameter list.

First deep neural network


Input layer with tan h activation function 22 neurons
Total hidden layers 3 hidden layers
First unseen (hidden) layer using the best activation function, Rectified Linear Unit (ReLu) 200 neurons
Second unseen (hidden) layer using the best activation function, Rectified Linear Unit (ReLu) 300 neurons
Third first unseen (hidden) layer using the best activation function, Rectified Linear Unit (ReLu) 100 neurons
Output layer with SoftMax activation function 2 neurons
Learning rate (LR) 0.01
Decay, momentum 1e − 6, 0.9
Loss, optimizer mean_squared_error, sgd
Epochs 99
Batch_size 35
Second deep neural network
Input layer with tan h activation function 22 neurons
Total hidden layers 3 hidden layers
First unseen layer using a best activation function, Rectified Linear Unit (ReLu) 100 neurons
Second unseen (hidden) layer using a best activation function, Rectified Linear Unit (ReLu) 200 neurons
Third first unseen (hidden) layer using a best activation function, Rectified Linear Unit (ReLu) 100 neurons
Output layer with SoftMax activation function 6 neurons
Learning rate (LR) 0.01
Decay, momentum 1e − 6, 0.9
Loss, optimizer categorical_crossentropy, sgd
Epochs 99
Batch_size 35
10 Wireless Communications and Mobile Computing

Confusion matrix for IOT devices and Non-IOT devices

100000
1.6e+04 2.4e+03
0
80000
Actual class

Scale
60000

40000
1.2e+04 1.2e+05
1

20000

0 1
Predicted class

Figure 5: Confusion matrix of IoT vs. non-IoT devices.

Confusion matrix for IOT devices and Non-IOT devices


3000
1.6e+03 3.1e+02 10 17 39 16
0

2500
1.1e+02 3e+03 56 61 1.6e+02 21
1

2000
Actual class

20 58 2.7e+03 7 16 2.2e+02
2

Scale
1500
2 34 3 1.9e+02 11 81
3

1000
4 57 3 2 2.4e+02 1
4

500
6 8 16 3 1 3e+02
5

0 1 2 3 4 5
Predicted class

Figure 6: Confusion matrix for the 2nd phase of the framework.

process will be repeated for all neurons of hidden layers and The error can be computed for each output neuron by
the output layer neurons. We can simplify Equation (1) as using the squared error function and summed to get the total
follows: error [30]:
n
net h1 = 〠 wi × xi + b: ð7Þ 1
i=1 ETotal = 〠 ðtarget − actualÞ2 : ð9Þ
2
After the net input of each hidden layer, neuron squashed
this net input using the logistic activation function to find the After getting the target value from the output of the output
output of each neuron of the hidden layer, this same process layer, we can calculate the error to adjust weights by using a
can be used for all neurons of the output layer as well, and backpropagation network.
the outputs of hidden layer neurons become the inputs of Table 2 shows the devices with their specific categories
the output layer; and at the output layer, we have used sigmoid and labels that we have used in our proposed method. This
function which can map value between 0 and 1. figure has not used the light bulb category in our proposed
model because there is only one device in this category.
1 Therefore, we have used only 6 categories for IoT devices
outh1 = : ð8Þ
1 + e−net h1 labeled 1-6.
Wireless Communications and Mobile Computing 11

Loss
1.2
1.0
0.8
0.6
0.4

0 20 40 60 80 100
Train_loss
Test_loss
Accuracy

0.8

0.7

0.6

0 20 40 60 80 100
Train
Test

Figure 7: Accuracy and loss of the proposed framework for 99 epochs.

Table 4: Optimal hyperparameters list values.

First deep neural network


Input layer with tan h activation function 22 neurons
Total hidden layers 4 hidden layers
First unseen (hidden) layer using the best activation function, Rectified Linear Unit (ReLu) 300 neurons
Second unseen (hidden) layer using the best activation function, Rectified Linear Unit (ReLu) 500 neurons
Third first unseen (hidden) layer using the best activation function, Rectified Linear Unit (ReLu) 150 neurons
Fourth unseen (hidden) layer using the best activation function, Rectified Linear Unit (ReLu) 300 neurons
Output layer with SoftMax activation function 2 neurons
Learning rate (LR) 0.0001
Decay, momentum 1e − 6, 0.9
Loss, optimizer mean_squared_error, sgd
Epochs 3800
Batch_size 15
Second deep neural network
Input layer with tan h activation function 22 neurons
Total hidden layers 4 hidden layers
First unseen layer using the best activation function, Rectified Linear Unit (ReLu) 300 neurons
Second unseen (hidden) layer using the best activation function, Rectified Linear Unit (ReLu) 500 neurons
Third first unseen (hidden) layer using the best activation function, Rectified Linear Unit (ReLu) 700 neurons
Fourth unseen (hidden) layer using the best activation function, Rectified Linear Unit (ReLu) 300 neurons
Output layer with SoftMax activation function 6 neurons
Learning rate (LR) 0.00001
Decay, momentum 1e − 6, 0.9
Loss, optimizer categorical_crossentropy, sgd
Epochs 3800
Batch_size 30
12 Wireless Communications and Mobile Computing

Confusion matrix

0 16905 1428

True label

1 11748 117762

0 1
Predicted label

Figure 8: Confusion matrix for IoT and non-IoT devices.

Model accuracy

0.8
Accuracy

0.6

0.4

0.2

0 500 1000 1500 2000 2500 3000 3500


Epoch

Train
Test

Figure 9: Training and testing accuracy of the first-stage DNN.

4. Performance Evaluation (iii) We also used cross-validation on the training data-


set with 10-folds
4.1. Data Construction and Modeling. Data construction and
(iv) The hierarchical DNN technique is applied, and the
modeling are as follows:
respective accuracies are mentioned in the results
(i) A total of 936893 samples were selected from the
data pcap files for applying the hierarchical DNN 4.2. Hyperparameter Setting for the Proposed Framework.
technique The models’ parameters are used to describe a way of con-
verting the input data into the model’s desired output.
(ii) 70% of training data for training the models and Hyperparameters instead of model parameters are used to
30% of data for testing the model determine the structure of the model in use. The outcome
Wireless Communications and Mobile Computing 13

model loss
6

loss 4

0
0 500 1000 1500 2000 2500 3000 3500
epoch
train
test

Figure 10: Loss of model with 0.2 of the first-stage DNN.

of the model can be changed by changing the values of Confusion Matrix


hyperparameters. Therefore, the choice of hyperparameters
is a crucial task and plays an important role. Keeping hyper- 0 1666 207 14 13 39 16
parameters in mind is half part of the solution. The second
part of the solution is knowing what kind of hyperparameter 1 109 3014 42 61 159 21
will be best for the model. In the proposed framework, we have
set different hyperparameters according to requirements.
Table 3 shows the values of nonoptimal hyperparameters that 2 20 58 2701 1 12 228
true label

we have used in hierarchical deep neural networks but not get-


ting high performance. Figures 5 and 6 represent the confu- 3 2 34 3 201 0 81
sion matrix of the first- and second-stage hierarchical deep
neural networks with nonoptimal hyperparameters. Figure 7
4 14 47 5 0 245 1
represents the accuracy and loss of the proposed framework
for 99 epochs for nonoptimal hyperparameters.
Table 4 shows the optimal hyperparameters and 5 6 8 16 3 1 596
achieved the required performance of the system.
In the proposed framework, we have applied the hierar- 0 1 2 3 4 5
chical DNN technique, and the respective performance mea- predicted label
sures are mentioned in the results.
Figure 11: Confusion matrix of the second-stage DNN for IoT
Figure 8 describes the confusion matrix of the first-stage
device classification.
deep neural network with 4 hidden layers with a different
number of neurons for optimal hyperparameters. In this fig- Table 5: Classification report.
ure, along the y-axis, the actual values are presented, and
along the x-axis, predicted values are presented in which 0 Label Support Precision Recall F1-score
shows non-IoT devices and 1 shows IoT devices. 0 1817 0.85 0.92 0.88
The accuracy of the model can be measured as follows:
1 3368 0.88 0.89 0.89
2 2781 0.89 0.97 0.93
All right Diagnols
Accuracy = 3 279 0.63 0.72 0.67
ðTotal Number of samplesÞ
4 456 0.79 0.54 0.64
117762 + 16903
= 5 943 0.95 0.63 0.76
147,841
= 0:9089ðwith unseen dataÞ,

True Positive True Positive


Precision = , Recall = ð10Þ
Total predicted true
:
Total Actual true
14 Wireless Communications and Mobile Computing

Model accuracy

0.8

Accuracy
0.6

0.4

0.2

0 500 1000 1500 2000 2500 3000 3500


epoch
train
test

Figure 12: Training and testing accuracy of the second-stage DNN for IoT device classification.

model loss

4
loss

0
0 500 1000 1500 2000 2500 3000 3500
epoch
train
test

Figure 13: Training and testing loss of the second-stage DNN.

Figure 9 shows the accuracy (0.9120) curve for training graph, along with the y-axis, the actual values are presented,
as well as for testing the accuracy of the first-stage deep neu- and along the x-axis, the predicted values are presented
ral network (DNN) used to discarnate IoT devices and non- within the range 0-5. Every value from 0 to 5 represents a
IoT devices. Figure 10 shows the loss curve for training as particular class. The accuracy of the model can be measured
well as for testing the loss of the first-stage deep neural net- as follows:
work (DNN) used to distinguish between IoT devices from
non-IoT devices.
Figure 11 shows the confusion matrix of the second- ðAll Right DignalsÞ
Accuracy =
stage deep neural network used for IoT device classification ðTotal Number of samplesÞ
using the heterogeneous network dataset. ð1666 + 3014 + 2701 + 201 + 245 + 696Þ
Figure 11 describes the confusion matrix of the second- =
9288
stage deep neural network with 4 hidden layers with a differ-
ent number of neurons for optimal hyperparameters. In this = 0:917958 ðOn unseen dataÞ,
Wireless Communications and Mobile Computing 15

Table 6: Comparison matrix.

Technique Dataset Result


Random forest (identification of devices) UNSW 82.34%
Decision tree (identification of devices) UNSW 79.88%
CNN-LSTM (categories [13]) UNSW 74.5%
Proposed framework (HDNN) UNSW 91.30% (average)

The proposed framework based on hierarchical deep


ðTrue PositiveÞ neural networks (DNNs) is used to discriminate IoT and
Precision = ,
ðTotal predicted trueÞ non-IoT devices and classify IoT devices to their specific cat-
egory. It has been shown that the proposed method is capa-
ðTrue PositiveÞ ble of an end-to-end system to distinguish IoT and non-IoT
Recall = : ð11Þ
ðTotal Actual trueÞ with 91% accuracy, besides classifying IoT devices to the
respective classes with an accuracy of 91.33% in heteroge-
Table 5 shows a classification report of the model, which neous networks. According to the comparison matrix as
has different types of performance parameters. Precision can shown in Table 6, it has been clear that already-proposed
be calculated by dividing the true positive by the total num- models were machine learning algorithms like random for-
ber of predicted true as given in the equation. Similarly, est and decision tree for the classification of IoT devices in
recall can be calculated by dividing the true positives by the environment in which only IoT devices were present.
the total number of actual trues as shown in the equation. However, proposed framework in this research can iden-
Figure 12 shows the accuracy curve for training and testing tify IoT devices and non-IoT devices and classify legitimate
accuracy of the second-stage deep neural network (DNN) IoT devices into their specific classes with approximately
used to classify IoT devices with a validation accuracy of 91% accuracy as an end-to-end system in a smart environ-
0.9179. The y-axis represents the accuracy of the proposed ment. This helps formulate administrative policies and regu-
model, and the x-axis represents the number of epochs. We late/police traffic in the network for better QoS management.
trained our model for 3800 epochs. The blue curve shows In a future study, we aim to examine a broader range of IoT
the training accuracy, and the orange line shows the accuracy device types and non-IoT devices for building an intelligent
of the test dataset, which is clear that there is no overfitting, environment, explore new communication technologies and
and the performance of the model is better. Figure 13 shows as well as new deep learning techniques, and experiment
the loss curve for training as well as for testing the loss of the with data from IoT devices compromised with spyware
second-stage deep neural network (DNN) used to classify and cyber espionage and detection of unauthorized devices
IoT devices into their respective class using traffic stream. for security purpose.
Table 6 shows a performance metric on existing tech-
niques that we have applied and our proposed framework. Data Availability
Previous systems were able to identify and classify IoT
devices with a very small range of the dataset, and these were The data used to support the findings of this study are avail-
not end-to-end systems for a smart or intelligent environ- able from the corresponding author upon request.
ment. But the proposed HDNN is an end-to-end system that
is used to discriminate IoT devices from non-IoT devices Conflicts of Interest
and, at the same time, classify IoT devices into their respec-
tive categories with reasonable accuracy, as shown in the The authors declare that they have no conflicts of interest.
proposed framework diagram. According to the comparison
matrix, it is clear that the proposed system gave better per- Acknowledgments
formance than the previous ones.
The authors are grateful to the Taif University Researchers
5. Conclusion Supporting Project (number TURSP-2020/36), Taif Univer-
sity, Taif, Saudi Arabia. This research work was also partially
With the emergence of the Internet of Things (IoT), a signif- supported by the Faculty of Computer Science and Informa-
icant number of IoT devices are built in various areas, such tion Technology, University of Malaya, under Postgraduate
as businesses, households, warehouses, and highways. The Research Grant PG035-2016A.
appropriate security of IoT devices is crucial since the state
of different IoT devices has other properties. The literature
survey demonstrated an excellent number of cited works
References
on IoT device identification and classification. Still, most of [1] H. Tahaei, F. Afifi, A. Asemi, F. Zaki, and N. B. Anuar, “The
the work applied to small enterprise networks is based on rise of traffic classification in IoT networks: a survey,” Journal
static information such as port information, MAC addresses, of Network and Computer Applications, vol. 154, article
and model train test for devices. 102538, 2020.
16 Wireless Communications and Mobile Computing

[2] Z. Guan, J. Li, L. Wu, Y. Zhang, J. Wu, and X. Du, “Achieving applications,” International Journal on Advances in Security,
efficient and secure data acquisition for cloud-supported inter- vol. 8, no. 1 & 2, p. 2015, 2015.
net of things in smart grid,” IEEE Internet of Things Journal, [19] Y. Meidan, M. Bohadana, A. Shabtai et al., “Detection of unau-
vol. 4, no. 6, pp. 1934–1944, 2017. thorized IoT devices using machine learning techniques,”
[3] D. Yu, L. Zhang, Y. Chen, Y. Ma, and J. Chen, “Large-scale IoT 2017, http://arxiv.org/abs/1709.04647.
devices firmware identification based on weak password,” [20] P. R. J. Pêgo and L. Nunes, “Automatic discovery and classifi-
IEEE Access, vol. 8, pp. 7981–7992, 2020. cations of IoT devices,” in 2017 12th Iberian Conference on
[4] M. Jindal, J. Gupta, and B. Bhushan, “Machine learning Information Systems and Technologies (CISTI), Lisbon, Portu-
methods for IoT and their Future Applications,” in 2019 Inter- gal, 2017.
national Conference on Computing, Communication, and [21] R. Ferrando and P. Stacey, “Classification of device behaviour
Intelligent Systems (ICCCIS), pp. 430–434, Greater Noida, in internet of things infrastructures,” in Proceedings of the 1st
India, 2019. International Conference on Internet of Things and Machine
[5] A. Sivanathan, D. Sherratt, H. H. Gharakheili et al., “Charac- Learning, New York, 2017.
terizing and classifying IoT traffic in smart cities and cam- [22] J. Shen, Y. Li, B. Li, H. Chen, and J. Li, “IoT eye an efficient sys-
puses,” in 2017 IEEE Conference on Computer tem for dynamic IoT devices auto-discovery on organization
Communications Workshops (INFOCOM WKSHPS), level,” in 2017 IEEE 4th International Conference on Cyber
pp. 559–564, Atlanta, GA, USA, 2017. Security and Cloud Computing (CSCloud), pp. 294–299, New
[6] Y. Yang, L. Wu, G. Yin, L. Li, and H. Zhao, “A survey on secu- York, NY, USA, 2017.
rity and privacy issues in Internet-of-Things,” IEEE Internet of [23] J. N. Suárez and A. Salcedo, “ID3 and k-means Based method-
Things Journal, vol. 4, no. 5, pp. 1250–1258, 2017. ology for Internet of Things device classification,” in 2017
[7] B. Lam and C. Larose, How did the internet of things allow the International Conference on Mechatronics, Electronics and
latest attack on the internet?, Ed, 2016. Automotive Engineering (ICMEAE), pp. 129–133, Cuernavaca,
[8] A. Alkhalil and R. A. Ramadan, “IoT data provenance imple- Mexico, 2017.
mentation challenges,” Procedia Computer Science, vol. 109, [24] M. Miettinen, S. Marchal, I. Hafeez et al., “IoT sentinel demo:
pp. 1134–1139, 2017. automated device-type identification for security enforcement
[9] R. Roman, J. Zhou, and J. Lopez, “On the features and chal- in IoT,” in 2017 IEEE 37th International Conference on Distrib-
lenges of security and privacy in distributed internet of things,” uted Computing Systems (ICDCS), pp. 2511–2514, Atlanta,
Computer Networks, vol. 57, no. 10, pp. 2266–2279, 2013. GA, USA, 2017.
[10] M. A. Al-Garadi, A. Mohamed, A. Al-Ali, X. Du, and [25] I. Cvitić, D. Peraković, M. Periša, and M. Botica, “Novel
M. Guizani, “A survey of machine and deep learning methods approach for detection of IoT generated DDoS traffic,” Wire-
for Internet of Things (IoT) security,” 2018, http://arxiv.org/ less Networks, vol. 27, no. 3, pp. 1573–1586, 2021.
abs/1807.11023. [26] A. S. Hsu, Automatic Internet of Things device category identi-
[11] F. Meneghello, M. Calore, D. Zucchetto, M. Polese, and fication using traffic rates, Virginia Tech, 2019.
A. Zanella, “IoT: Internet of threats? A survey of practical [27] A. Radford, L. Metz, and S. Chintala, “Unsupervised represen-
security vulnerabilities in real IoT devices,” IEEE Internet of tation learning with deep convolutional generative adversarial
Things Journal, vol. 6, pp. 8182–8201, 2019. networks,” 2015, http://arxiv.org/1511.06434.
[12] M. Chiang and T. Zhang, “Fog and IoT: an overview of [28] M. Lopez-Martin, B. Carro, and A. Sanchez-Esguevillas, “IoT
research opportunities,” IEEE Internet of Things Journal, type-of-traffic forecasting method based on gradient boosting
vol. 3, no. 6, pp. 854–864, 2016. neural networks,” Future Generation Computer Systems,
[13] L. Bai, L. Yao, S. S. Kanhere, X. Wang, and Z. Yang, “Auto- vol. 105, pp. 331–345, 2020.
matic device classification from network traffic streams of [29] O. Salman, I. H. Elhajj, A. Chehab, and A. Kayssi, “A machine
internet of things,” in 2018 IEEE 43rd Conference on Local learning based framework for IoT device identification and
Computer Networks (LCN), Chicago, IL, USA, 2018. abnormal traffic detection,” Transactions on Emerging Tele-
[14] P. Bajpai, A. K. Sood, and R. J. Enbody, “The art of mapping communications Technologies, vol. 33, no. 3, article e3743,
IoT devices in networks,” Network Security, vol. 2018, no. 4, 2022.
pp. 8–15, 2018. [30] I. Cvitić, D. Peraković, B. Gupta, and K.-K. R. Choo, “Boost-
[15] A. Sivanathan, H. H. Gharakheili, F. Loi et al., “Classifying IoT ing-based DDoS detection in Internet of Things systems,”
devices in smart environments using network traffic character- IEEE Internet of Things Journal, vol. 9, no. 3, pp. 2109–2123,
istics,” IEEE Transactions on Mobile Computing, vol. 18, no. 8, 2022.
pp. 1745–1759, 2019.
[16] A. Sivanathan, H. H. Gharakheili, and V. Sivaraman, “Manag-
ing IoT cyber-security using programmable telemetry and
machine learning,” IEEE Transactions on Network and Service
Management, vol. 17, no. 1, pp. 60–74, 2020.
[17] M. Lopez-Martin, B. Carro, A. Sanchez-Esguevillas, and
J. Lloret, “Network traffic classifier with convolutional and
recurrent neural networks for internet of things,” IEEE Access,
vol. 5, pp. 18042–18050, 2017.
[18] R. Falk and S. Fries, “Using managed certificate whitelisting as
a basis for internet of things security in industrial automation

You might also like