Machine learning-powered encrypted network traffic analysis: A comprehensive survey

M Shen, K Ye, X Liu, L Zhu, J Kang… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
Traffic analysis is the process of monitoring network activities, discovering specific patterns,
and gleaning valuable information from network traffic. It can be applied in various fields …

A survey on device behavior fingerprinting: Data sources, techniques, application scenarios, and datasets

PMS Sánchez, JMJ Valero, AH Celdrán… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
In the current network-based computing world, where the number of interconnected devices
grows exponentially, their diversity, malfunctions, and cybersecurity threats are increasing at …

DÏoT: A federated self-learning anomaly detection system for IoT

TD Nguyen, S Marchal, M Miettinen… - 2019 IEEE 39th …, 2019 - ieeexplore.ieee.org
IoT devices are increasingly deployed in daily life. Many of these devices are, however,
vulnerable due to insecure design, implementation, and configuration. As a result, many …

Iot sentinel: Automated device-type identification for security enforcement in iot

M Miettinen, S Marchal, I Hafeez… - 2017 IEEE 37th …, 2017 - ieeexplore.ieee.org
With the rapid growth of the Internet-of-Things (IoT), concerns about the security of IoT
devices have become prominent. Several vendors are producing IP-connected devices for …

Peek-a-boo: I see your smart home activities, even encrypted!

A Acar, H Fereidooni, T Abera, AK Sikder… - Proceedings of the 13th …, 2020 - dl.acm.org
A myriad of IoT devices such as bulbs, switches, speakers in a smart home environment
allow users to easily control the physical world around them and facilitate their living styles …

Deep learning convolutional neural networks for radio identification

S Riyaz, K Sankhe, S Ioannidis… - IEEE Communications …, 2018 - ieeexplore.ieee.org
Advances in software defined radio (SDR) technology allow unprecedented control on the
entire processing chain, allowing modification of each functional block as well as sampling …

ORACLE: Optimized radio classification through convolutional neural networks

K Sankhe, M Belgiovine, F Zhou… - … -IEEE Conference on …, 2019 - ieeexplore.ieee.org
This paper describes the architecture and performance of ORACLE, an approach for
detecting a unique radio from a large pool of bit-similar devices (same hardware, protocol …

Audi: Toward autonomous iot device-type identification using periodic communication

S Marchal, M Miettinen, TD Nguyen… - IEEE Journal on …, 2019 - ieeexplore.ieee.org
IoT devices are being widely deployed. But the huge variance among them in the level of
security and requirements for network resources makes it unfeasible to manage IoT …

Behavioral fingerprinting of iot devices

B Bezawada, M Bachani, J Peterson, H Shirazi… - Proceedings of the …, 2018 - dl.acm.org
The Internet-of-Things (IoT) has brought in new challenges in device identification--what the
device is, and authentication--is the device the one it claims to be. Traditionally, the …

Automated iot device identification using network traffic

A Aksoy, MH Gunes - ICC 2019-2019 IEEE international …, 2019 - ieeexplore.ieee.org
IoT devices have been gaining popularity and become integral to our daily life. These
devices are prone to be compromised as well as any computing system, but lack computing …