IoT Device Fingerprinting: Machine Learning based Encrypted Traffic Analysis

Nizar Msadek, R. Soua, T. Engel
{"title":"IoT Device Fingerprinting: Machine Learning based Encrypted Traffic Analysis","authors":"Nizar Msadek, R. Soua, T. Engel","doi":"10.1109/WCNC.2019.8885429","DOIUrl":null,"url":null,"abstract":"Even in the face of strong encryption, the spectacular Internet of Things (IoT) penetration across sectors such as e-health, energy, transportation, and entertainment is expanding the attack surface, which can seriously harm users' privacy. We demonstrate in this paper that an attacker is able to disclose sensitive information about the IoT device, such as its type, by identifying specific patterns in IoT traffic. To perform the fingerprint attack, we train machine-learning algorithms based on selected features extracted from the encrypted IoT traffic. Extensive simulations involving the baseline approach show that we achieve not only a significant mean accuracy improvement of 18.5% and but also a speedup of 18.39 times for finding the best estimators. Obtained results should spur the attention of policymakers and IoT vendors to secure the IoT devices they bring to market.","PeriodicalId":352128,"journal":{"name":"2019 IEEE Wireless Communications and Networking Conference (WCNC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"55","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE Wireless Communications and Networking Conference (WCNC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WCNC.2019.8885429","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 55

Abstract

Even in the face of strong encryption, the spectacular Internet of Things (IoT) penetration across sectors such as e-health, energy, transportation, and entertainment is expanding the attack surface, which can seriously harm users' privacy. We demonstrate in this paper that an attacker is able to disclose sensitive information about the IoT device, such as its type, by identifying specific patterns in IoT traffic. To perform the fingerprint attack, we train machine-learning algorithms based on selected features extracted from the encrypted IoT traffic. Extensive simulations involving the baseline approach show that we achieve not only a significant mean accuracy improvement of 18.5% and but also a speedup of 18.39 times for finding the best estimators. Obtained results should spur the attention of policymakers and IoT vendors to secure the IoT devices they bring to market.
物联网设备指纹:基于机器学习的加密流量分析
即使面对强大的加密,物联网(IoT)在电子医疗、能源、交通和娱乐等领域的惊人渗透正在扩大攻击面,这可能严重损害用户的隐私。我们在本文中证明,攻击者能够通过识别物联网流量中的特定模式来披露有关物联网设备的敏感信息,例如其类型。为了执行指纹攻击,我们基于从加密物联网流量中提取的选定特征训练机器学习算法。涉及基线方法的大量模拟表明,我们不仅实现了18.5%的显着平均精度提高,而且在寻找最佳估计器方面加速了18.39倍。获得的结果应该会引起政策制定者和物联网供应商的注意,以确保他们推向市场的物联网设备的安全。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信