Machine learning-powered encrypted network traffic analysis: A comprehensive survey
Traffic analysis is the process of monitoring network activities, discovering specific patterns,
and gleaning valuable information from network traffic. It can be applied in various fields …
and gleaning valuable information from network traffic. It can be applied in various fields …
Device fingerprinting in wireless networks: Challenges and opportunities
Node forgery or impersonation, in which legitimate cryptographic credentials are captured
by an adversary, constitutes one major security threat facing wireless networks. The fact that …
by an adversary, constitutes one major security threat facing wireless networks. The fact that …
Iot sentinel: Automated device-type identification for security enforcement in iot
With the rapid growth of the Internet-of-Things (IoT), concerns about the security of IoT
devices have become prominent. Several vendors are producing IP-connected devices for …
devices have become prominent. Several vendors are producing IP-connected devices for …
Deep learning convolutional neural networks for radio identification
Advances in software defined radio (SDR) technology allow unprecedented control on the
entire processing chain, allowing modification of each functional block as well as sampling …
entire processing chain, allowing modification of each functional block as well as sampling …
ORACLE: Optimized radio classification through convolutional neural networks
K Sankhe, M Belgiovine, F Zhou… - … -IEEE Conference on …, 2019 - ieeexplore.ieee.org
This paper describes the architecture and performance of ORACLE, an approach for
detecting a unique radio from a large pool of bit-similar devices (same hardware, protocol …
detecting a unique radio from a large pool of bit-similar devices (same hardware, protocol …
Behavioral fingerprinting of iot devices
The Internet-of-Things (IoT) has brought in new challenges in device identification--what the
device is, and authentication--is the device the one it claims to be. Traditionally, the …
device is, and authentication--is the device the one it claims to be. Traditionally, the …
Automated iot device identification using network traffic
IoT devices have been gaining popularity and become integral to our daily life. These
devices are prone to be compromised as well as any computing system, but lack computing …
devices are prone to be compromised as well as any computing system, but lack computing …
DEFT: A distributed IoT fingerprinting technique
Identifying IoT devices connected to a network has multiple security benefits, such as
deployment of behavior-based anomaly detectors, automated vulnerability patching of …
deployment of behavior-based anomaly detectors, automated vulnerability patching of …
[PDF][PDF] Who's in Control of Your Control System? Device Fingerprinting for Cyber-Physical Systems.
D Formby, P Srinivasan, AM Leonard, JD Rogers… - NDSS, 2016 - ndss-symposium.org
Industrial control system (ICS) networks used in critical infrastructures such as the power
grid present a unique set of security challenges. The distributed networks are difficult to …
grid present a unique set of security challenges. The distributed networks are difficult to …
GTID: A Technique for Physical Device and Device Type Fingerprinting
SV Radhakrishnan, AS Uluagac… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
In this paper, we introduce GTID, a technique that can actively and passively fingerprint
wireless devices and their types using wire-side observations in a local network. GTID …
wireless devices and their types using wire-side observations in a local network. GTID …