期刊文献+

基于流量和文本指纹的两层物联网设备分类识别模型

Two-layer IoT Device Classification Recognition Model Based on Traffic and Text Fingerprints
下载PDF
导出
摘要 为及时隔离局域网内易受攻击的异常物联网设备,对网络管理员而言,具备高效的设备分类识别能力至关重要。现有方法中所选择的特征与设备关联性不高,且设备状态的差异会导致样本数据不平衡。针对上述问题,文中提出了一种基于流量和文本指纹的物联网设备分类识别模型FT-DRF(Flow Text-Double Random Forest)。首先设计特征挖掘模型,选取稳定的流统计数据作为设备流量指纹;其次基于HTTP,DNS和DHCP等应用层协议头部字段中的敏感文本信息生成设备文本指纹;在此基础上,对数据进行预处理并生成特征向量;最后,设计基于双层随机森林的机器学习算法对设备进行分类识别。对由13个物联网设备组成的模拟智能家居环境数据集和公共数据集进行有监督分类识别实验,结果表明,FT-DRF模型能够识别网络摄像头、智能音箱等物联网设备,平均准确率可达99.81%,相比现有典型方法提升了2%~5%。 In order to isolate the vulnerable and abnormal IoT devices in the local area network in time,efficient device classification and identification capability is very important for network administrators.The features selected in the existing methods are not highly correlated with equipment,and the sample data is unbalanced due to differences in equipment status.Aiming at the above problems,this paper proposes an IoT device classification and identification model FT-DRF based on traffic and text fingerprints.This method firstly designs a feature mining model,selects stable flow statistics as device traffic fingerprints,and then generates device text fingerprints based on sensitive text information in the header fields of application layer protocols such as HTTP,DNS,and DHCP.On this basis,the data is preprocessed and the feature vector is generated.Finally,a machine learning algorithm based on double-layer random forest is designed to classify and identify the devices.A supervised classification and re-cognition experiment is conducted on the simulated smart home environment dataset composed of 13 IoT devices and public dataset.The results show that the FT-DRF model can identify IoT devices such as network cameras and smart speakers,with an ave-rage accuracy rate of 99.81%,which is 2%~5%higher than that of the existing typical methods.
作者 祝博宇 陈霄 沙乐天 肖甫 ZHU Boyu;CHEN Xiao;SHA Letian;XIAO Fu(School of Computer Science,Nanjing University of Posts and Telecomunications,Nanjing 210023,China;Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks,Nanjing 210003,China)
出处 《计算机科学》 CSCD 北大核心 2023年第8期304-313,共10页 Computer Science
基金 国家自然科学基金重点项目(61932013)。
关键词 物联网 设备识别 机器学习 流量分类 敏感文本 Internetof Things Device recognition Machine learning Traffic classification Sensitive text
  • 相关文献

参考文献4

二级参考文献15

  • 1ZoomEye.网络设备统计分析[EB/OL].(2015-12-31)[2015-12-31].https://WWW.zoomeye.org/statistic/device.
  • 2Gallagher S. Backdoor in wireless DSL routers lets attacker reset router, get admin [ EB/OLI. (2014-01-03) [ 2015-12- 31 ]. http : /'/' arstechnica, com/security/2014/O1/backdoor-in- wireless-dsl-routers-lets-attacker-reset-router-get-admin/.
  • 3Chirgwin R. Hacker backdoors Linksys, Netgear, Cisco and otheh routers [ EB/OL]. (2014-01-06) [2015-12-31 ]. http:// www. theregister, co. uk/2014/01/06/hacker_ backdoors_ linksys_netgear_cisco_and_other_routers/.
  • 4国家互联网应急中心.关于多款D-LINK路由器产品存在后门漏洞的情况通报[EB/OL].(2013-10-25)[2015-12-31].http://WWW.celt.org.cn/publish/main/9/2013/20131025152943288740930/20131025152943288740930_.html.
  • 5Singh D, Sinha R, Songara P, et al. Vulnerabilities and attacks targeting social networks and industrial control systems [J]. Eprint Arxiv, 2014, 4(1) :133-142.
  • 6Shah S. An introduction to HTTP fingerprinting [ EB/OL]. (2004-05-19) [ 2015-12-31 ]. http:// net-square. com/ httprint_paper, html.
  • 7Lee D, Rowe J, Ko C, et al. Detecting and defending against Web-server fingerprinting [ C ]//CSAC 2002 : 2002 Computer Security Applications Conference. United States: IEEE Computer Society, 2002 : 321-330.
  • 8Fyodor. Remote OS detection via TCP/IP stack fingerprinting [J]. Phrack Magazine, 1998, 17(3): 1-10.
  • 9刘三民,孙知信,刘余霞.基于K均值集成和SVM的P2P流量识别研究[J].计算机科学,2012,39(4):46-48. 被引量:8
  • 10彭勇,江常青,谢丰,戴忠华,熊琦,高洋.工业控制系统信息安全研究进展[J].清华大学学报(自然科学版),2012,52(10):1396-1408. 被引量:175

共引文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部