Machine learning-powered encrypted network traffic analysis: A comprehensive survey

M Shen, K Ye, X Liu, L Zhu, J Kang… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
Traffic analysis is the process of monitoring network activities, discovering specific patterns,
and gleaning valuable information from network traffic. It can be applied in various fields …

Device fingerprinting in wireless networks: Challenges and opportunities

Q Xu, R Zheng, W Saad, Z Han - … Communications Surveys & …, 2015 - ieeexplore.ieee.org
Node forgery or impersonation, in which legitimate cryptographic credentials are captured
by an adversary, constitutes one major security threat facing wireless networks. The fact that …

Iot sentinel: Automated device-type identification for security enforcement in iot

M Miettinen, S Marchal, I Hafeez… - 2017 IEEE 37th …, 2017 - ieeexplore.ieee.org
With the rapid growth of the Internet-of-Things (IoT), concerns about the security of IoT
devices have become prominent. Several vendors are producing IP-connected devices for …

Deep learning convolutional neural networks for radio identification

S Riyaz, K Sankhe, S Ioannidis… - IEEE Communications …, 2018 - ieeexplore.ieee.org
Advances in software defined radio (SDR) technology allow unprecedented control on the
entire processing chain, allowing modification of each functional block as well as sampling …

ORACLE: Optimized radio classification through convolutional neural networks

K Sankhe, M Belgiovine, F Zhou… - … -IEEE Conference on …, 2019 - ieeexplore.ieee.org
This paper describes the architecture and performance of ORACLE, an approach for
detecting a unique radio from a large pool of bit-similar devices (same hardware, protocol …

Behavioral fingerprinting of iot devices

B Bezawada, M Bachani, J Peterson, H Shirazi… - Proceedings of the …, 2018 - dl.acm.org
The Internet-of-Things (IoT) has brought in new challenges in device identification--what the
device is, and authentication--is the device the one it claims to be. Traditionally, the …

Automated iot device identification using network traffic

A Aksoy, MH Gunes - ICC 2019-2019 IEEE international …, 2019 - ieeexplore.ieee.org
IoT devices have been gaining popularity and become integral to our daily life. These
devices are prone to be compromised as well as any computing system, but lack computing …

DEFT: A distributed IoT fingerprinting technique

V Thangavelu, DM Divakaran, R Sairam… - IEEE Internet of …, 2018 - ieeexplore.ieee.org
Identifying IoT devices connected to a network has multiple security benefits, such as
deployment of behavior-based anomaly detectors, automated vulnerability patching of …

[PDF][PDF] Who's in Control of Your Control System? Device Fingerprinting for Cyber-Physical Systems.

D Formby, P Srinivasan, AM Leonard, JD Rogers… - NDSS, 2016 - ndss-symposium.org
Industrial control system (ICS) networks used in critical infrastructures such as the power
grid present a unique set of security challenges. The distributed networks are difficult to …

GTID: A Technique for Physical Device and Device Type Fingerprinting

SV Radhakrishnan, AS Uluagac… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
In this paper, we introduce GTID, a technique that can actively and passively fingerprint
wireless devices and their types using wire-side observations in a local network. GTID …