Machine learning-powered encrypted network traffic analysis: A comprehensive survey
Traffic analysis is the process of monitoring network activities, discovering specific patterns,
and gleaning valuable information from network traffic. It can be applied in various fields …
and gleaning valuable information from network traffic. It can be applied in various fields …
A survey on device behavior fingerprinting: Data sources, techniques, application scenarios, and datasets
In the current network-based computing world, where the number of interconnected devices
grows exponentially, their diversity, malfunctions, and cybersecurity threats are increasing at …
grows exponentially, their diversity, malfunctions, and cybersecurity threats are increasing at …
DÏoT: A federated self-learning anomaly detection system for IoT
IoT devices are increasingly deployed in daily life. Many of these devices are, however,
vulnerable due to insecure design, implementation, and configuration. As a result, many …
vulnerable due to insecure design, implementation, and configuration. As a result, many …
Iot sentinel: Automated device-type identification for security enforcement in iot
With the rapid growth of the Internet-of-Things (IoT), concerns about the security of IoT
devices have become prominent. Several vendors are producing IP-connected devices for …
devices have become prominent. Several vendors are producing IP-connected devices for …
Peek-a-boo: I see your smart home activities, even encrypted!
A myriad of IoT devices such as bulbs, switches, speakers in a smart home environment
allow users to easily control the physical world around them and facilitate their living styles …
allow users to easily control the physical world around them and facilitate their living styles …
Deep learning convolutional neural networks for radio identification
Advances in software defined radio (SDR) technology allow unprecedented control on the
entire processing chain, allowing modification of each functional block as well as sampling …
entire processing chain, allowing modification of each functional block as well as sampling …
ORACLE: Optimized radio classification through convolutional neural networks
K Sankhe, M Belgiovine, F Zhou… - … -IEEE Conference on …, 2019 - ieeexplore.ieee.org
This paper describes the architecture and performance of ORACLE, an approach for
detecting a unique radio from a large pool of bit-similar devices (same hardware, protocol …
detecting a unique radio from a large pool of bit-similar devices (same hardware, protocol …
Audi: Toward autonomous iot device-type identification using periodic communication
IoT devices are being widely deployed. But the huge variance among them in the level of
security and requirements for network resources makes it unfeasible to manage IoT …
security and requirements for network resources makes it unfeasible to manage IoT …
Behavioral fingerprinting of iot devices
The Internet-of-Things (IoT) has brought in new challenges in device identification--what the
device is, and authentication--is the device the one it claims to be. Traditionally, the …
device is, and authentication--is the device the one it claims to be. Traditionally, the …
Automated iot device identification using network traffic
IoT devices have been gaining popularity and become integral to our daily life. These
devices are prone to be compromised as well as any computing system, but lack computing …
devices are prone to be compromised as well as any computing system, but lack computing …