Trey Reece;Supreeth Sathyanarayana;William H. Robinson;Raheem A. Beyah
{"title":"On The Outside Looking In: Towards Detecting Counterfeit Devices Using Network Traffic Analysis","authors":"Trey Reece;Supreeth Sathyanarayana;William H. Robinson;Raheem A. Beyah","doi":"10.1109/TMSCS.2016.2631534","DOIUrl":null,"url":null,"abstract":"In order to combat the growing threat of counterfeit components, this paper describes a technique to fingerprint and identify components based upon the way in which they send and process ICMP, UDP, and TCP network packets. These network fingerprints are then processed by an artificial neural network in order to categorize and classify individual processors. These tests found that ICMP and UDP packets provided an an effective, inexpensive, and fast tool for identifying counterfeit components in a network.","PeriodicalId":100643,"journal":{"name":"IEEE Transactions on Multi-Scale Computing Systems","volume":"3 1","pages":"50-61"},"PeriodicalIF":0.0000,"publicationDate":"2016-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1109/TMSCS.2016.2631534","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Multi-Scale Computing Systems","FirstCategoryId":"1085","ListUrlMain":"https://ieeexplore.ieee.org/document/7752950/","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
In order to combat the growing threat of counterfeit components, this paper describes a technique to fingerprint and identify components based upon the way in which they send and process ICMP, UDP, and TCP network packets. These network fingerprints are then processed by an artificial neural network in order to categorize and classify individual processors. These tests found that ICMP and UDP packets provided an an effective, inexpensive, and fast tool for identifying counterfeit components in a network.