4.7 Article

Towards automatic fingerprinting of IoT devices in the cyberspace

Journal

COMPUTER NETWORKS
Volume 148, Issue -, Pages 318-327

Publisher

ELSEVIER
DOI: 10.1016/j.comnet.2018.11.013

Keywords

-

Funding

  1. National Key R&D Program of China [2017YFB0802804]
  2. National Natural Science Foundation of China [61602029]

Ask authors/readers for more resources

Nowadays, the cyberspace consists of an increasing number of IoT devices, such as net-printers, webcams, and routers. Illuminating the nature of online devices would provide insights into detecting potentially vulnerable devices on the Internet. However, there is a lack of device discovery in large-scale due to the massive number of device models (i.e., types, vendors, and products). In this paper, we propose an efficient approach to generate fingerprints of IoT devices. We observe that device manufacturers have different network system implementations on their products. We explore features spaces of IoT devices in three network layers, including the network-layer, transport-layer, and application-layer. Utilizing the feature of network protocols, we generate IoT device fingerprints based on neural network algorithms. Furthermore, we implement the prototype system and conduct real experiments to validate the performance of device fingerprints. Results show that our classification can generate device class labels with a 94% precision and 95% recall. We use those device fingerprints to discover 15.3 million network-connected devices and analyze their distribution characteristics in cyberspace. (C) 2018 Elsevier B.V. All rights reserved.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Engineering, Electrical & Electronic

Influential spatial facility prediction over large scale cyber-physical vehicles in smart city

Hongtao Wang, Qiang Li, Feng Yi, Zhi Li, Limin Sun

EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING (2016)

Article Computer Science, Hardware & Architecture

A Framework for Searching Internet-Wide Devices

Qiang Li, Xuan Feng, Lian Zhao, Limin Sun

IEEE NETWORK (2017)

Article Computer Science, Information Systems

Understanding the Usage of Industrial Control System Devices on the Internet

Qiang Li, Xuan Feng, Haining Wang, Limin Sun

IEEE INTERNET OF THINGS JOURNAL (2018)

Article Computer Science, Information Systems

Who owns Internet of Thing devices?

Yuxuan Jia, Bing Han, Qiang Li, Hong Li, Limin Sun

INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2018)

Article Engineering, Electrical & Electronic

iFinger: Intrusion Detection in Industrial Control Systems via Register-Based Fingerprinting

Kai Yang, Qiang Li, Xiaodong Lin, Xin Chen, Limin Sun

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2020)

Article Computer Science, Hardware & Architecture

GeoCAM: An IP-Based Geolocation Service Through Fine-Grained and Stable Webcam Landmarks

Qiang Li, Zhihao Wang, Dawei Tan, Jinke Song, Haining Wang, Limin Sun, Jiqiang Liu

Summary: IP-based geolocation is crucial for location-aware Internet applications, and GeoCAM leverages online webcams to automatically generate high-quality landmarks, enhancing geolocation accuracy and coverage.

IEEE-ACM TRANSACTIONS ON NETWORKING (2021)

Article Computer Science, Hardware & Architecture

Understanding Security Risks of Embedded Devices Through Fine-Grained Firmware Fingerprinting

Qiang Li, Dawei Tan, Xin Ge, Haining Wang, Zhi Li, Jiqiang Liu

Summary: This article conducts a systematic study on device vulnerabilities using firmware fingerprints, revealing that many embedded devices are still using outdated firmware with known vulnerabilities, posing significant security risks.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2022)

Article Computer Science, Information Systems

DevTag: A Benchmark for Fingerprinting IoT Devices

Shangfeng Wan, Qiang Li, Haining Wang, Hong Li, Limi Sun

Summary: In this work, we developed a benchmark called DevTag for accurately fingerprinting IoT devices. DevTag supports retrieving packet-level features from IoT devices through passive monitoring and active probing. It integrates model-based and rule-based fingerprinting methods and underwent a systematic analysis to explore their advantages and limitations. Finally, we implemented and distributed a prototype of DevTag as the first benchmark for detecting IoT devices in the network community.

IEEE INTERNET OF THINGS JOURNAL (2023)

Proceedings Paper Computer Science, Hardware & Architecture

PDGraph: A Large-Scale Empirical Study on Project Dependency of Security Vulnerabilities

Qiang Li, Jinke Song, Dawei Tan, Haining Wang, Jiqiang Liu

Summary: This study is the first large-scale empirical research on the relationship between project dependencies and security vulnerabilities. By utilizing the innovative approach PDGraph, a large number of project dependencies with publicly known security vulnerabilities were discovered, revealing existing security risks.

51ST ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN 2021) (2021)

Proceedings Paper Computer Science, Information Systems

Towards IP-based Geolocation via Fine-grained and Stable Webcam Landmarks

Zhihao Wang, Qiang Li, Jinke Song, Haining Wang, Limin Sun

WEB CONFERENCE 2020: PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE (WWW 2020) (2020)

Proceedings Paper Computer Science, Information Systems

Understanding and Securing Device Vulnerabilities through Automated Bug Report Analysis

Xuan Feng, Xiaojing Liao, XiaoFeng Wang, Haining Wang, Qiang Li, Kai Yang, Hongsong Zhu, Limin Sun

PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUM (2019)

Proceedings Paper Computer Science, Theory & Methods

DTaint: Detecting the Taint-Style Vulnerability in Embedded Device Firmware

Kai Cheng, Qiang Li, Lei Wang, Qian Chen, Yaowen Zheng, Limin Sun, Zhenkai Liang

2018 48TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN) (2018)

Proceedings Paper Computer Science, Information Systems

Acquisitional Rule-based Engine for Discovering Internet-of-Thing Devices

Xuan Feng, Qiang Li, Haining Wang, Limin Sun

PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM (2018)

Article Computer Science, Hardware & Architecture

Under the Concealing Surface: Detecting and Understanding Live Webcams in the Wild

Jinke Song, Qiang Li, Haining Wang, Limin Sun

PROCEEDINGS OF THE ACM ON MEASUREMENT AND ANALYSIS OF COMPUTING SYSTEMS (2020)

Article Computer Science, Hardware & Architecture

TEA-RFFI: Temperature adjusted radio frequency fingerprint-based smartphone identification

Xiaolin Gu, Wenjia Wu, Yusen Zhou, Aibo Song, Ming Yang, Zhen Ling, Junzhou Luo

Summary: This study proposes a radio frequency fingerprint identification solution based on crystal oscillator temperature adjustment, which enhances the differences between Wi-Fi device fingerprints and mitigates collision. Experimental results demonstrate the effectiveness of the system in identifying smartphones under different scenarios.

COMPUTER NETWORKS (2024)

Article Computer Science, Hardware & Architecture

QoS-based resource allocation for uplink NOMA networks

Yutong Wu, Jianyue Zhu, Xiao Chen, Yu Zhang, Yao Shi, Yaqin Xie

Summary: This paper proposes a quality-of-service-based SIC order method and optimizes power allocation for maximizing the rate in the uplink NOMA system. The simulation results demonstrate the superiority of the proposed method compared to traditional orthogonal multiple access and exhaustive search.

COMPUTER NETWORKS (2024)

Article Computer Science, Hardware & Architecture

Mitigating the impact of controller failures on QoS robustness for software-defined wide area networks

Songshi Dou, Li Qi, Zehua Guo

Summary: Emerging cloud services and applications have different QoS requirements for the network. SD-WANs play a crucial role in QoS provisioning by introducing network programmability, dynamic flow routing, and low data transmission latency. However, controller failures may degrade QoS. To address this, we propose PREDATOR, a QoS-aware network programmability recovery scheme that achieves fine-grained per-flow remapping without introducing extra delays, ensuring QoS robustness for high-priority flows.

COMPUTER NETWORKS (2024)

Article Computer Science, Hardware & Architecture

An efficient topology partitioning algorithm for system-level parallel simulation of mega satellite constellation communication networks

Ke Wang, Xiaojuan Ma, Heng Kang, Zheng Lyu, Baorui Feng, Wenliang Lin, Zhongliang Deng, Yun Zou

Summary: This paper proposes a method based on a parallel network simulation architecture to improve the simulation efficiency of satellite networks. By effectively partitioning the network topology and using algorithms such as resource assessment and load balancing, the simulation performance is enhanced. Experimental results demonstrate the effectiveness of this method.

COMPUTER NETWORKS (2024)

Article Computer Science, Hardware & Architecture

Reuse-based online joint routing and scheduling optimization mechanism in deterministic networks

Sijin Yang, Lei Zhuang, Julong Lan, Jianhui Zhang, Bingkui Li

Summary: This paper proposes a reuse-based online scheduling mechanism that achieves deterministic transmission of dynamic flows through dynamic path planning and coordinated scheduling of time slots. Experimental results show that the proposed mechanism improves the scheduling success rate by 37.3% and reduces time costs by up to 66.6% compared to existing online scheduling algorithms.

COMPUTER NETWORKS (2024)