f02 IoTTFID - An - Incremental - IoT - Device - Identification - Model - Based - On - Traffic - Fingerprint
f02 IoTTFID - An - Incremental - IoT - Device - Identification - Model - Based - On - Traffic - Fingerprint
ABSTRACT Driven by 5G communication technology, IoT devices are widely deployed in various scenarios
to provide automated services. However, a large number of IoT devices cannot install strong encryption
suites and become the preferred target of cyber attackers. Specific vulnerabilities target specific types of IoT
devices. Screening and repairing corresponding vulnerabilities based on device information can improve
device protection capabilities. Traditional device identification models are static and have limitations in
the identification range. The model needs to be trained from scratch to identity new types of devices,
which consumes a lot of computing resources and training time. To overcome these limitations, we propose
IoTTFID, an incremental IoT device identification model based on traffic fingerprint. Extract the traffic
fingerprint of the new device, convert it into an input vector after preprocessing, and input it to the original
model to update some network parameters, so that the model has the ability to identify new devices. The
results of evaluation on two open datasets show that the accuracy of IoTTFID is 98.09% on UNSW dataset
and 98.29% on Yourthings dataset, which outperforms the existing methods. IoTTFID has an accuracy rate of
80.4% after five incremental learning stages, and an F1 of over 96% for encrypted IoT devices. IoTTFID can
dynamically adjust with the actual environment to increase the range of identifiable device types, providing
strong support for the security management of IoT devices.
INDEX TERMS IoT, device identification, IoT security, fingerprinting, deep learning.
According to the special behavior pattern of IoT device and has high scalability and high practicability. It can improve
communication, researchers analyze device network com- the device security management capability in the network
munication traffic to identify device information [12], [13], environment.
[14], [15]. Their approaches show excellent accuracy in iden- However, there are three challenges in realizing IoTTFID:
tifying a fixed number of IoT devices. However, as new (1) It is difficult to extract common traffic fingerprints of gen-
types of devices continue to be connected to the real network eral IoT devices and encrypted IoT devices. The traffic finger-
environment, static supervised models cannot identify device prints are preprocessed to generate feature vectors to train the
categories outside the training set [16]. To address this prob- identification model, so the quality of the traffic fingerprints
lem, Bao et al. [17] proposed a hybrid supervised and unsu- directly affects the device identification performance of the
pervised learning method, combining deep neural networks model. (2) As the model keeps learning new device features,
and unsupervised clustering to achieve visible and invisible model performance will degrade because it is difficult to
device classification. Capture traffic of devices connected to maintain the memory of old devices. (3) As the scope of
the network and extract features to build a binary classifier model identification increases, resource consumption will
for each device in the whitelist. The discriminator judges also continue to increase. Excessive resource consumption
whether the feature vector is known or not. The clustering will lead to reduced model utility [19].
module clusters agnostic feature vectors. This method can In response, IoTTFID proposed the following innovative
perform secondary classification on unseen device types, but designs:
building a separate classifier for each device would make the 1) Device traffic fingerprint extraction. IoT devices com-
model too large. More devices in the whitelist occupy more municate using a variety of network protocols, includ-
computing resources. Bremler-Barr et al. [18] proposed three ing encryption protocols [20]. In order to solve the
classifiers to identify IoT devices and non-IoT devices. The problem of device fingerprint extraction of different
first is a classifier based on traffic characteristics, the second protocols, we propose a jump-type device fingerprint
is a classifier based on DHCP protocol information, and the extraction algorithm, which jumps and extracts data
third is a unified form of the first two classifiers. A DHCP packets of the same protocol in the time dimension and
protocol packet is generated when the device is connected stitches them into a complete session. Extract the data
to the network or IP is updated. The DHCP protocol is not link layer, network layer, transport layer header charac-
available in some network configurations. The model does teristics of each data packet in the session, application
not classify new devices in more detail, so the context of use layer message characteristics and session global statis-
is limited. The model realizes the identification of devices tical characteristics to generate device fingerprints for
in an open environment following two conditions: (1) Less identifying IoT devices. This algorithm is applicable
resource consumption. The equipment identification model to both encrypted devices and non-encrypted devices,
should have the ability to update dynamically. New devices which can effectively distinguish different IoT devices.
added to the network are iteratively updated on the basis 2) Model forgetting. With the continuous addition of
of the original model, consuming less computing resources. new devices, the model will forget the knowledge
As the number of new devices in the network continues to of old devices, resulting in a decline in identifica-
increase, the device identification model should continuously tion accuracy. To reduce model forgetting, we propose
increase the number of identifiable device types, while the a multi-protocol representative population selection
model occupies less storage resources. (2) Wider identifica- strategy. At the end of each incremental learning phase,
tion range. The real network communication environment has a fixed number of samples is selected to be added
encrypted traffic and non-IoT device traffic, so the model to the representative population, which will be part
should have the ability to identify devices using encryption of the training set for the next incremental learning
protocols and non-IoT devices in the network. phase, so that the model can refer to the old class
In this study we design IoTTFID, an incremental IoT samples when updating parameters. As a model param-
device identification model based on traffic fingerprint. eter update condition, the cross-distillation loss func-
IoTTFID uses new device traffic fingerprints to update some tion increases the memory ability of the model for old
network parameters on the basis of the original model, devices.
so that the model has the ability to identify new devices 3) Resource consumption. The resource consumption of
without forgetting the previous devices. The model applies the model will increase with the number of devices.
equally to devices using encrypted protocols and non-IoT Excessive resource consumption leads to reduced
devices. As the number of identifiable devices increases, model practicality [21]. To address this problem,
the model only occupies a fixed size of storage resources we design a device identification model based on
without additional resource consumption. IoTTFID solves Transformer. On the one hand, Transformer has paral-
the problem of limited number of identifications by tradi- lel computing capabilities, which can reduce the con-
tional identification models, realizes continuous and uninter- sumption of model computing resources. On the other
rupted identification of new devices in an open environment, hand, the size of the representative population is fixed.
An increase in the number of devices does not result Finally, the processed traffic fingerprint is used as a data set
in an increase in the size of the representative popula- to construct a device identification model based on machine
tion, so the storage resources for the model remain the learning, which is used to identify the device type, model and
same. other information of IoT devices.
We evaluate the model on the UNSW dataset and
Yourthings dataset. Experiments show that IoTTFID has an B. INCREMENTAL LEARNING
identification accuracy rate of 98.09% on 20 devices in the
Incremental learning aims to allow machines to imitate the
UNSW dataset and 98.29% on 30 devices in the Yourthings
human ability to learn new knowledge. The model learns
dataset, outperforming other methods. In the incremen-
new concepts through a small number of cases without
tal learning test, the identification range of IoTTFID was
forgetting existing knowledge. ‘‘Catastrophic forgetting’’ is
expanded to 50 devices after 5 incremental learning stages,
a challenge in incremental learning tasks, and the classic
with an accuracy rate of 80.4%. Adding five incremental
solution is to introduce knowledge distillation to transfer
learning stages in the learning test, the identification range of
knowledge from old models to new ones. Castro et al. [23]
IoTTFID is expanded to 50 devices, and the accuracy rate is
propose that EEIL combines cross-entropy loss and distilla-
80.4%. The model also performs well on the identification of
tion loss into cross-distillation loss. The new category cal-
non-IoT devices and encrypted devices. IoTTFID effectively
culates cross-entropy loss, and the old category calculates
solves the problem of limited identification range, and can
distillation loss and cross-entropy loss, realizing an end-to-
continuously increase the identification range of devices in a
end incremental learning model. Liu et al. [24] propose a
dynamic network environment with high persistence and high
mnemonic training framework to address the category incre-
scalability.
ment problem by simultaneously learning a classification
The rest of the paper is as follows: Section II introduces
model and mnemonic paradigms to make class boundaries
related work. Section III introduces our model. Section IV
more distinguishable.
analyzes the experimental results. Section V conclusions and
The types of devices connected to the network will change
future work.
all the time. Traditional machine learning models are static
and cannot adapt to changing networks. The incremental
II. RELATED RESEARCH
IoT device identification model we proposed only needs to
A. IoT DEVICE IDENTIFICATION MODEL
fingerprint the traffic of the new device, adding it to the
According to the different methods of obtaining device fin-
existing model and update the parameters to adapt to the
gerprints, the identification models of IoT devices are divided
newly connected device. The model maintains old knowledge
into active identification models and passive identification
through a fixed-size representative sample set, and samples
models. The active identification model sends a request to the
of each class are used only once without additional memory
target address through the probe, uses the rule to match the
consumption. Trusted new devices connect to the network
response data of the port, and obtains the corresponding soft-
through rapid update models that dynamically adjust the
ware service information and hardware device information.
identification device types. Prevent malicious devices from
Active identification has the characteristics of fast scanning
posing as normal identities to access the network and spread
speed and wide identification range. Active identification is
network viruses.
mainly used for public Internet exposed surface asset scan-
ning and network asset management. Sending a large number
of detection packets will increase the network load and be C. EXISTING WORKS
easily intercepted by the defense system. The passive iden- The communication flow of the device reflects the behavior
tification model identifies the device type by capturing the pattern of the device. Traffic identification technology has
communication flow of the device and using traffic character- attracted widespread attention of researchers in network secu-
istic modeling. Passive identification has the characteristics rity and traffic engineering in the early days [25], [26]. Traffic
of high concealment and simple implementation, and does identification is one of the open issues in network security
not bring additional pressure to the network. It is mainly used research [27]. Researchers analyze the traffic of IoT devices
for intrusion detection, access authentication, and malicious to understand their behavior and improve the security of IoT
attack identification [22]. devices. Fan et al. [28] proposed AutIoT, a semi-supervised
The passive identification model includes three parts: learning method that employs neural networks to extract
traffic capture, traffic processing, and device identification. high-dimensional features from traffic. Multi-task learning
Firstly, the traffic of the IoT device is captured at the gateway, to distinguish IoT devices from non-IoT devices, using KS
including the initial configuration of the device, communica- test to improve the maximum probability performance of the
tion between the device and the service provider, and user new model output to classify new types of devices and known
instructions. The captured device raw traffic is saved in the types of devices. Bao et al. [29] classify unseen devices by
form of pcap files. Then parse the pcap file, extract the charac- means of blended learning. Combining deep neural network
teristics of the device data link layer, network layer, transport and unsupervised clustering, using autoencoder technology
layer, and application layer to generate traffic fingerprints. to reduce the dimensionality of the data set and balance the
III. METHODOLOGY
A. IoTTFID OVERVIEW
The framework of IoTTFID can be seen in Fig. 1. It mainly
consists of four modules: Session Stitching, Traffic Finger-
print Extraction, Device Identification and Device Represen-
tative Population Update.
1) SESSION STITCHING
In network communication, affected by the transmission path,
the sending order of data packets at the sending end is not FIGURE 1. The framework of IoTTFID.
necessarily the same as the receiving order of data packets
at the receiving end. The data packets sent by the sender
are transmitted to the receiver along different paths. The transport layer header field features, application layer mes-
receiving end usually needs to check the seq number and sage features and session global features in the session to gen-
ack number in the TCP header to confirm the order of the erate device traffic fingerprints. The device traffic fingerprint
packets. The out-of-sequence data in different data packets is preprocessed and transformed into the input paradigm of
is reassembled in the correct order to obtain the original the neural network.
data. After the data is received, the receiving end sends a
confirmation message to the sending end to ensure that all 3) DEVICE IDENTIFICATION
packet data has been received correctly. This module cap- The module uses the Transformer framework to build a device
tures traffic at the wireless access node and stores it as a identification model. The timestamp of the data packet is
PCAP file. Parses the PCAP file, extracts the same pro- monotonically increasing, and the application layer message
tocol data packets and stitches them into a complete ses- is of text type, so the data packet sample can be regarded as a
sion. Prepare for the next stage of extracting session global time sequence. Transformer has parallel computing capabil-
features. ities, which can improve data processing speed and respond
quickly when faced with massive traffic data. Self-attention
2) TRAFFIC FINGERPRINT EXTRACTION mechanism can extract higher-dimensional time-domain fea-
This module uses the jump-type device fingerprint extraction tures of data packet samples to correctly identify relevant
algorithm to extract the packet data link layer, network layer, information of devices.
TABLE 1. Feature location and feature name. Algorithm 1 Jump-Type Device Fingerprint Extraction
Algorithm
Input: device raw network traffic pcap file
Output: session level dataset session_datasets
Use the Scapy library function to split the pcap file into individual packets
P1, P2, . . . , Pn, where n is the total number of packets in the pcap file.
session_features ← ∅;
session_datasets ← ∅;
for each Pi do
packet_protocol ← Extract the top level protocol in Pi;
packet_length ← Len(Pi);
if P haslayer(IP) then
IP_header_features ← Extract network layer features in
IP headers;
else if P haslayer(TCP) then
TCP_header_features ← Extract transport layer features in TCP
header;
else if P haslayer(UDP) then
UDP_header_features ← Extract transport layer features
in DUP header;
else if P has(Raw_data) then
message_features ← Extract message in application layer
and convert hexadecimal to decimal;
else
ether_features ← Extract data link layer features in Ether frame;
end
packet_features ← IP_header_features ∪ TCP_header_features ∪
UDP_header_features ∪ message_features ∪ ether_features;
The data link layer, network layer, transport layer and if Len(packet_features) ≤ max_len then
application layer features in Table 1 are all special fields packet_features ∪ (‘‘0’’ ∗ (max_len Len(packet_features)));
else
and payloads in the header. In session-level statistical fea- packet_features ← Get the frist max_len beytes in packet_features;
tures, PCK_size indicates the packet length, Payload_bytes end
indicates the packet length, Payload_entropy indicates the end
for each packet_features do
packet entropy value, Session_Protocol indicates the pro- if packet_protocol is same then
tocol used by the session, Padding_size indicates the session_features ← Select the same protocol packets in
padding length, Session_max indicates the maximum packet chronological order and extract session-level statistical features;
session_datasets ∪ session_features;
length in the session, Session_min indicates the minimum end
length of data packets in a session, Session_avg indi- end
cates the average length of session data packets, and Ses- return session_datasets;
sion_median indicates the median length of session data
packets. Algorithm 1 sets the maximum byte length threshold
of packet_features to max_len, fill with 0 when the length
is less than max_len, and intercept to the max_len position
when the length exceeds max_len. Divide the session into
several samples in chronological order, each sample con-
tains N packet_features, and discard the last sample when
the number of packet_features is less than N . The com-
plete algorithm for extracting device fingerprints is shown
in Algorithm 1.
In order to determine the value of max_len, we count the
packet length in the UNSW dataset and Yourthings dataset,
including the minimum packet length, maximum packet
length, average packet length, and median packet length.
The results are shown in Fig. 4. Due to the different lengths
of data packet headers and payloads of different protocols, FIGURE 4. Statistical characteristics of packets in UNSW dataset and
Yourthings dataset.
the length of the data packet is not fixed during transmis-
sion, and the length of the data packet varies greatly. Both
the UNSW dataset and Yourthings dataset have a minimum
packet length of 45 bytes, and the longest packet length the Yourthings dataset is 553, and the median packet length
in both datasets exceeds 2000 bytes. The average length is 366 bytes. Considering comprehensively, the threshold
of packets in the UNSW dataset is 572, and the median value max_len is selected as 500 as the packet segmentation
packet length is 334 bytes. The average packet length in length.
loss [39] that retains the knowledge of the old class and the
cross-entropy loss that learns the knowledge of the new class
as the cross-distillation loss, the function formula is shown in
Eq. (6)
XF
L (x) = 1 − λ LC (x) + λ LDf (x)
(6)
f =1
where Q, K, and V are√ matrices converted from input vectors, where p̂k (x) represents the predicted values of the incremental
and the function of d k is to prevent the gradient from learning stage t − 1, pk (x) represents stage t models for the
disappearing due to too large a dot product. Adding position k-th class.
coding to the input vector strengthens the input order of the
time series sequence, and the formula of position coding is IV. PERFORMANCE ANALYSIS
shown in Eq. (4)-(5) A. EVALUATION DATASET
pos
The UNSW dataset [32] records the network communication
PE(pos,2i) = sin 2i/dmodel
(4) traffic of 28 IoT devices within 26 weeks. The data trans-
1000 mission uses a variety of protocols, such as DNS, UDP, TCP,
pos
PE(pos,2i+1) = cos (5) HTTP, ICMP, etc. Some of these devices have less traffic data,
10002i/dmodel such as BlipcareBloodPressureMeter, NESTSmokeAlarm,
where pos is the position of the current element, i represents etc. Finally, we selected 20 devices in the dataset as our
the dimension of the element. experimental dataset.
Network traffic packet timestamps are monotonically The Yourthings dataset [40] contains the traffic generated
increasing. The elements at the current moment are related by 45 smart home devices in 10 days, among which Amazon
to the elements at the previous and subsequent moments. EchoGen1, NestCamera, Withings Home and other devices
The content of the application layer message is a time series use encryption protocols, and we selected 30 of them as the
sequence of this text type. Therefore we use the Transformer experimental dataset.
Encoder layer as the base model for incremental learning.
When the model performs incremental learning tasks, B. TRAFFIC FINGERPRINT MODEL EVALUATION
a distillation loss function is introduced to prevent the model First, we test the performance of the model after applying
from ‘‘catastrophic forgetting.’’ Combining the distillation Algorithm 1 on the dataset, where the setting is due to the
imbalance in the number of samples in the dataset, and we TABLE 3. IoTTFID performance on Yourthings dataset.
use F1 to evaluate the performance of the model.
TABLE 5. The performance of the model when the incremental class is 10.
dataset is 98.29%. After five incremental learning stages, [12] M. Miettinen, S. Marchal, I. Hafeez, N. Asokan, A. Sadeghi, and
it still achieves 80.4% accuracy on 50 devices, outperform- S. Tarkoma, ‘‘IoT SENTINEL: Automated device-type identification for
security enforcement in IoT,’’ in Proc. IEEE 37th Int. Conf. Distrib. Com-
ing existing models. The F1 of IoTTFID on encrypted IoT put. Syst. (ICDCS), Atlanta, GA, USA, Jun. 2017, pp. 2177–2184.
devices can reach more than 96%. In addition, the experi- [13] L. Bai, L. Yao, S. S. Kanhere, X. Wang, and Z. Yang, ‘‘Automatic device
mental results prove that our model can increase the range classification from network traffic streams of Internet of Things,’’ in
Proc. IEEE 43rd Conf. Local Comput. Netw. (LCN), Chicago, IL, USA,
of device identification without retraining, and overcome the Oct. 2018, pp. 1–9.
problems of resource consumption and model forgetting. The [14] S. Marchal, M. Miettinen, T. D. Nguyen, A. Sadeghi, and N. Asokan,
model has high performance and high scalability. ‘‘AuDI: Toward autonomous IoT device-type identification using peri-
odic communication,’’ IEEE J. Sel. Areas Commun., vol. 37, no. 6,
In future work, we will collect more protocols of IoT device
pp. 1402–1412, Jun. 2019.
communication traffic for experiments, including IoT devices [15] A. Aksoy and M. H. Gunes, ‘‘Automated IoT device identification using
using TCP/IP protocol communication, smart terminals using network traffic,’’ in Proc. IEEE Int. Conf. Commun. (ICC), Shanghai,
ZigBee, Bluetooth and other protocols. We can further extend China, May 2019, pp. 1–7.
[16] Y. Liu, J. Wang, J. Li, S. Niu, and H. Song, ‘‘Machine learning for the
to unsupervised models for identifying unknown devices. The detection and identification of Internet of Things devices: A survey,’’ IEEE
model will be deployed to various network environments Internet Things J., vol. 9, no. 1, pp. 298–320, Jan. 2022.
for training, increasing the learning ability of the model and [17] J. Bao, B. Hamdaoui, and W. Wong, ‘‘IoT device type identification
making it adapt to more complex open network environments. using hybrid deep learning approach for increased IoT security,’’ in Proc.
Int. Wireless Commun. Mobile Comput. (IWCMC), Limassol, Cyprus,
Jun. 2020, pp. 565–570.
DATA AVAILABILITY [18] A. Bremler-Barr, H. Levy, and Z. Yakhini, ‘‘IoT or NoT: Identifying IoT
The data used to support the fndings of this study are available devices in a short time scale,’’ in Proc. IEEE/IFIP Netw. Oper. Manage.
Symp. (NOMS), Budapest, Hungary, Apr. 2020, pp. 1–9.
from the corresponding author upon request. [19] F. Yin, L. Yang, J. Ma, Y. Zhou, Y. Wang, and J. Dai, ‘‘Identifying IoT
devices based on spatial and temporal features from network traffic,’’
Secur. Commun. Netw., vol. 2021, pp. 1–16, Nov. 2021.
CONFLICTS OF INTEREST
[20] N. Ammar, L. Noirie, and S. Tixeuil, ‘‘Network-protocol-based IoT device
The authors declare that they have no conficts of interest. identification,’’ in Proc. 4th Int. Conf. Fog Mobile Edge Comput. (FMEC),
Shanghai, China, May 2019, pp. 204–209.
ACKNOWLEDGMENT [21] L. Fan, L. He, Y. Wu, S. Zhang, Z. W. Wang, J. Li, J. Yang, C. Xiang, and
X. Ma, ‘‘AutoIoT: Automatically updated IoT device identification with
The authors would like to thank their supervisor, Qinxia Hao, semi-supervised learning,’’ IEEE Trans. Mobile Comput., early access,
for her guidance through each stage of the process. Jun. 14, 2022, doi: 10.1109/TMC.2022.3183118.
[22] H. Tahaei, F. Afifi, A. Asemi, F. Zaki, and N. B. Anuar, ‘‘The rise of traffic
classification in IoT networks: A survey,’’ J. Netw. Comput. Appl., vol. 154,
REFERENCES Mar. 2020, Art. no. 102538.
[1] N. Mishra and S. Pandya, ‘‘Internet of Things applications, security [23] F. M. Castro, M. J. Marín-Jiménez, N. Guil, C. Schmid, and K. Alahari,
challenges, attacks, intrusion detection, and future visions: A systematic ‘‘End-to-end incremental learning,’’ in Proc. Eur. Conf. Comput. Vis.
review,’’ IEEE Access, vol. 9, pp. 59353–59377, 2021. (ECCV), Munich, Germany, 2018, pp. 233–248.
[2] I. H. Sarker, A. I. Khan, Y. B. Abushark, and F. Alsolami, ‘‘Internet of [24] Y. Liu, Y. Su, A. Liu, B. Schiele, and Q. Sun, ‘‘Mnemonics training: Multi-
Things (IoT) security intelligence: A comprehensive overview, machine class incremental learning without forgetting,’’ in Proc. IEEE/CVF Conf.
learning solutions and research directions,’’ Mobile Netw. Appl., pp. 1–17, Comput. Vis. Pattern Recognit. (CVPR), New York, NY, USA, Jun. 2020,
Mar. 2022, doi: 10.1007/s11036-022-01937-3. pp. 12242–12251.
[3] J. Telo, ‘‘Smart city security threats and countermeasures in the context [25] L. Bernaille, R. Teixeira, I. Akodkenou, A. Soule, and K. Salamatian,
of emerging technologies,’’ Int. J. Intell. Automat. Comput., vol. 6, no. 1, ‘‘Traffic classification on the fly,’’ ACM SIGCOMM Comput. Commun.
pp. 31–45, 2023. Rev., vol. 36, no. 2, pp. 23–26, Apr. 2006.
[4] I. Butun, P. Österberg, and H. Song, ‘‘Security of the Internet of Things: [26] A. Dainotti, A. Pescape, and K. C. Claffy, ‘‘Issues and future directions in
Vulnerabilities, attacks, and countermeasures,’’ IEEE Commun. Surveys traffic classification,’’ IEEE Netw., vol. 26, no. 1, pp. 35–40, Jan. 2012.
Tuts., vol. 22, no. 1, pp. 616–644, 1st Quart., 2020. [27] J. Zhang, X. Chen, Y. Xiang, W. Zhou, and J. Wu, ‘‘Robust network traffic
[5] L. Zhang, L. Gong, and H. Qian, ‘‘An effiective IoT device identification classification,’’ IEEE/ACM Trans. Netw., vol. 23, no. 4, pp. 1257–1270,
using machine learning algorithm,’’ in Proc. IEEE 6th Int. Conf. Comput. Aug. 2015.
Commun. (ICCC), Chengdu, China, Dec. 2020, pp. 874–877. [28] L. Fan, L. He, Y. Wu, S. Zhang, Z. W. Wang, J. Li, J. Yang, C. Xiang, and
[6] F. John Dian, R. Vahidnia, and A. Rahmati, ‘‘Wearables and the Internet of X. Ma, ‘‘AutoIoT: Automatically updated IoT device identification with
Things (IoT), applications, opportunities, and challenges: A survey,’’ IEEE semi-supervised learning,’’ IEEE Trans. Mobile Comput., early access,
Access, vol. 8, pp. 69200–69211, 2020. Jun. 14, 2022, doi: 10.1109/TMC.2022.3183118.
[7] B. Bellalta, L. Bononi, R. Bruno, and A. Kassler, ‘‘Next generation IEEE [29] J. Bao, B. Hamdaoui, and W. Wong, ‘‘IoT device type identification using
802.11 wireless local area networks: Current status, future directions and hybrid deep learning approach for increased IoT security,’’ in Proc. Int.
open challenges,’’ Comput. Commun., vol. 75, pp. 1–25, Feb. 2016. Wireless Commun. Mobile Comput. (IWCMC), Xi’an, China, Jun. 2020,
[8] R. Nazir, A. A. Laghari, K. Kumar, K. Kumar, S. David, and M. Ali, pp. 565–570.
‘‘Survey on wireless network security,’’ Arch. Comput. Methods Eng., [30] K. Kostas, M. Just, and M. A. Lones, ‘‘IoTDevID: A behavior-based device
vol. 29, pp. 1591–1610, Jul. 2021. identification method for the IoT,’’ IEEE Internet Things J., vol. 9, no. 23,
[9] I. Hafeez, M. Antikainen, A. Y. Ding, and S. Tarkoma, ‘‘IoT-KEEPER: pp. 23741–23749, Dec. 2022.
Detecting malicious IoT network activity using online traffic analysis at [31] A. Pashamokhtari, H. H. Gharakheili, and V. Sivaraman, ‘‘Progressive
the edge,’’ IEEE Trans. Netw. Service Manage., vol. 17, no. 1, pp. 45–59, monitoring of IoT networks using SDN and cost-effective traffic signa-
Mar. 2020. tures,’’ in Proc. Workshop Emerg. Technol. Secur. IoT (ETSecIoT), Sydney,
[10] J. Kotak and Y. Elovici, ‘‘IoT device identification using deep learning,’’ NSW, Australia, Apr. 2020, pp. 1–6.
in Proc. 13th Int. Conf. Comput. Intell. Secur. Inf. Syst., Burgos, Spain, [32] A. Sivanathan, H. H. Gharakheili, F. Loi, A. Radford, C. Wijenayake,
Sep. 2021, pp. 76–86. A. Vishwanath, and V. Sivaraman, ‘‘Classifying IoT devices in smart
[11] C. Kolias, G. Kambourakis, A. Stavrou, and J. Voas, ‘‘DDoS in the IoT: environments using network traffic characteristics,’’ IEEE Trans. Mobile
Mirai and other botnets,’’ Computer, vol. 50, no. 7, pp. 80–84, 2017. Comput., vol. 18, no. 8, pp. 1745–1759, Aug. 2019.
[33] O. Salman, I. H. Elhajj, A. Chehab, and A. Kayssi, ‘‘A machine learn- [42] R. Kumar, M. Swarnkar, G. Singal, and N. Kumar, ‘‘IoT network traffic
ing based framework for IoT device identification and abnormal traffic classification using machine learning algorithms: An experimental analy-
detection,’’ Trans. Emerg. Telecommun. Technol., vol. 33, no. 3, p. e3743, sis,’’ IEEE Internet Things J., vol. 9, no. 2, pp. 989–1008, Jan. 2022.
Mar. 2022.
[34] S. Kumar, S. Dalal, and V. Dixit, ‘‘The OSI model: Overview on the seven
layers of computer networks,’’ Int. J. Comput. Sci. Inf. Technol. Res., vol. 2,
no. 3, pp. 461–466, 2014.
[35] J. Bang, H. Kim, Y. Yoo, J. Ha, and J. Choi, ‘‘Rainbow memory: Continual QINXIA HAO received the Ph.D. degree, in 2022.
learning with a memory of diverse samples,’’ in Proc. IEEE/CVF Conf. She is currently a Master Tutor with the College
Comput. Vis. Pattern Recognit. (CVPR), New York, NY, USA, Jun. 2021, of Communication and Information Engineering,
pp. 8214–8223. Xi’an University of Science and Technology. Her
[36] C. Zhang, N. Song, G. Lin, Y. Zheng, P. Pan, and Y. Xu, ‘‘Few-shot incre- research interests include the IoT applications and
mental learning with continually evolved classifiers,’’ in Proc. IEEE/CVF data security decisions.
Conf. Comput. Vis. Pattern Recognit. (CVPR), New York, NY, USA,
Jun. 2021, pp. 12450–12459.
[37] M. Welling, ‘‘Herding dynamical weights to learn,’’ in Proc. 26th Annu.
Int. Conf. Mach. Learn., New York, NY, USA, Jun. 2009, pp. 1121–1128.
[38] A. Vaswani, N. Shazeer, N. Parmar, J. Uszkoreit, L. Jones, A. N. Gomez,
Ł. Kaiser, and I. Polosukhin, ‘‘Attention is all you need,’’ in Proc. Adv.
Neural Inf. Process. Syst., 2017, pp. 5998–6008.
[39] G. Hinton, O. Vinyals, and J. Dean, ‘‘Distilling the knowledge in a neural ZHENG RONG was born in Henan, China,
network,’’ Comput. Sci., vol. 14, no. 7, pp. 38–39, 2015. in 1998. He is currently pursuing the mas-
[40] O. Alrawi, C. Lever, M. Antonakakis, and F. Monrose, ‘‘SoK: Secu- ter’s degree with the College of Communication
rity evaluation of home-based IoT deployments,’’ in Proc. IEEE and Information Engineering, Xi’an University of
Symp. Secur. Privacy (SP), San Francisco, CA, USA, May 2019, Science and Technology. His research interests
pp. 1362–1380. include cyber security and cyberspace exploration.
[41] J. Ortiz, C. Crawford, and F. Le, ‘‘DeviceMien: Network device behav-
ior modeling for identifying unknown IoT devices,’’ in Proc. Int. Conf.
Internet Things Design Implement., New York, NY, USA, Apr. 2019,
pp. 106–117.