A Haystack Full of Needles: Scalable Detection of IoT Devices in the Wild

Said Jawad Saidi, A. Mandalari, Roman Kolcun, H. Haddadi, Daniel J. Dubois, D. Choffnes, Georgios Smaragdakis, A. Feldmann
{"title":"A Haystack Full of Needles: Scalable Detection of IoT Devices in the Wild","authors":"Said Jawad Saidi, A. Mandalari, Roman Kolcun, H. Haddadi, Daniel J. Dubois, D. Choffnes, Georgios Smaragdakis, A. Feldmann","doi":"10.1145/3419394.3423650","DOIUrl":null,"url":null,"abstract":"Consumer Internet of Things (IoT) devices are extremely popular, providing users with rich and diverse functionalities, from voice assistants to home appliances. These functionalities often come with significant privacy and security risks, with notable recent large-scale coordinated global attacks disrupting large service providers. Thus, an important first step to address these risks is to know what IoT devices are where in a network. While some limited solutions exist, a key question is whether device discovery can be done by Internet service providers that only see sampled flow statistics. In particular, it is challenging for an ISP to efficiently and effectively track and trace activity from IoT devices deployed by its millions of subscribers---all with sampled network data. In this paper, we develop and evaluate a scalable methodology to accurately detect and monitor IoT devices at subscriber lines with limited, highly sampled data in-the-wild. Our findings indicate that millions of IoT devices are detectable and identifiable within hours, both at a major ISP as well as an IXP, using passive, sparsely sampled network flow headers. Our methodology is able to detect devices from more than 77% of the studied IoT manufacturers, including popular devices such as smart speakers. While our methodology is effective for providing network analytics, it also highlights significant privacy consequences.","PeriodicalId":255324,"journal":{"name":"Proceedings of the ACM Internet Measurement Conference","volume":"42 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"48","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the ACM Internet Measurement Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3419394.3423650","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 48

Abstract

Consumer Internet of Things (IoT) devices are extremely popular, providing users with rich and diverse functionalities, from voice assistants to home appliances. These functionalities often come with significant privacy and security risks, with notable recent large-scale coordinated global attacks disrupting large service providers. Thus, an important first step to address these risks is to know what IoT devices are where in a network. While some limited solutions exist, a key question is whether device discovery can be done by Internet service providers that only see sampled flow statistics. In particular, it is challenging for an ISP to efficiently and effectively track and trace activity from IoT devices deployed by its millions of subscribers---all with sampled network data. In this paper, we develop and evaluate a scalable methodology to accurately detect and monitor IoT devices at subscriber lines with limited, highly sampled data in-the-wild. Our findings indicate that millions of IoT devices are detectable and identifiable within hours, both at a major ISP as well as an IXP, using passive, sparsely sampled network flow headers. Our methodology is able to detect devices from more than 77% of the studied IoT manufacturers, including popular devices such as smart speakers. While our methodology is effective for providing network analytics, it also highlights significant privacy consequences.
一堆针:物联网设备的可扩展检测
消费者物联网(IoT)设备非常受欢迎,为用户提供丰富多样的功能,从语音助手到家用电器。这些功能通常会带来重大的隐私和安全风险,最近值得注意的是,大规模的全球协同攻击破坏了大型服务提供商。因此,解决这些风险的重要第一步是了解物联网设备在网络中的位置。虽然存在一些有限的解决方案,但一个关键问题是,设备发现是否可以由只看到采样流量统计数据的互联网服务提供商来完成。特别是,对于ISP来说,高效和有效地跟踪和跟踪其数百万用户部署的物联网设备的活动是具有挑战性的,所有这些设备都具有采样的网络数据。在本文中,我们开发和评估了一种可扩展的方法,以在有限的、高度采样的野外数据中准确检测和监控用户线路上的物联网设备。我们的研究结果表明,在主要的ISP和IXP中,使用被动的、稀疏采样的网络流标头,在几小时内就可以检测和识别数百万个物联网设备。我们的方法能够检测超过77%的研究物联网制造商的设备,包括智能扬声器等流行设备。虽然我们的方法在提供网络分析方面是有效的,但它也突出了严重的隐私后果。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信