Skip to main content
Log in

Identification of IoT Device From Network Traffic Using Artificial Intelligence Based Capsule Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

In recent decades, security threats have posed a high risk to an organization, which is associated with the proliferation of IoT devices and increasing organizational assets. This ensures that the organization is unaware of the IoT devices' connection to their own network. In such cases, the security and integrity of the network might pose a serious security threat to the network communications. In this paper, the capsule network, which is an improved version of the convolutional neural network (CNN), is used to monitor the network traffic to identify accurately the trusted devices connected to the home network. The inadequacy of CNN in identifying IoT devices during their communication on the network has made the present research choose Capsule Networks (CapsNet) for device identification. The Capsule network carries out the operation in an iterative manner in order to attain improved classification of IoT devices. The activation function used in the capsule network is a squash function that normalizes the magnitude of the vector rather than the conventional use of scalar elements. The outputs of the activation function help to find trusted IoT devices through different capsules, which are formally trained using various concepts. The capsule network performs the identification of IoT devices and classifies trusted and non-trusted devices based on the labeled network traffic data. The simulation is performed by the computation of collected labeled network data from the IoT associated network.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Miorandi, D., Sicari, S., De Pellegrini, F., & Chlamtac, I. (2012). Internet of things: Vision, applications and research challenges. Ad hoc Networks, 10(7), 1497–1516.

    Article  Google Scholar 

  2. Singhal, A., & Ou, X. (2017). Security risk analysis of enterprise networks using probabilistic attack graphs. In Network security metrics (pp. 53–73). Springer, Cham.

  3. Tripathi, D., Ramachandra Reddy, B., Padmanabha Reddy, Y. C. A., Shukla, A. K., Kumar, R. K., & Sharma, N. K. BAT algorithm based feature selection: Application in credit scoring. Journal of Intelligent & Fuzzy Systems, (Preprint), 1–10.

  4. Lakhina, A., Crovella, M., &Diot, C. (2005). Mining anomalies using traffic feature distributions. In ACM SIGCOMM computer communication review (Vol. 35, No. 4, pp. 217–228). ACM.

  5. Lakhina, A., Papagiannaki, K., Crovella, M., Diot, C., Kolaczyk, E. D., & Taft, N. (2004). Structural analysis of network traffic flows. In ACM SIGMETRICS performance evaluation review (Vol. 32, No. 1, pp. 61–72). ACM.

  6. Iglesias, F., & Zseby, T. (2015). Analysis of network traffic features for anomaly detection. Machine Learning, 101(1–3), 59–84.

    Article  MathSciNet  Google Scholar 

  7. Afshar, P., Mohammadi, A., & Plataniotis, K. N. (2018). Brain tumor type classification via capsule networks. In 2018 25th IEEE international conference on image processing (ICIP) (pp. 3129–3133). IEEE.

  8. Zhao, W., Ye, J., Yang, M., Lei, Z., Zhang, S., & Zhao, Z. (2018). Investigating capsule networks with dynamic routing for text classification. arXiv preprint arXiv:1804.00538.

  9. Shahroudnejad, A., Afshar, P., Plataniotis, K. N., & Mohammadi, A. (2018). Improved explainability of capsule networks: Relevance path by agreement. In 2018 IEEE global conference on signal and information processing (GlobalSIP) (pp. 549–553). IEEE.

  10. Sabour, S., Frosst, N., & Hinton, G. E. (2017). Dynamic routing between capsules. In Advances in neural information processing systems (pp. 3856–3866).

  11. Meidan, Y., Bohadana, M., Shabtai, A., Guarnizo, J. D., Ochoa, M., Tippenhauer, N. O., & Elovici, Y. (2017). ProfilIoT: a machine learning approach for IoT device identification based on network traffic analysis. In Proceedings of the symposium on applied computing (pp. 506–509). ACM.

  12. Bhuyan, M. H., Bhattacharyya, D. K., & Kalita, J. K. (2016). A multi-step outlier-based anomaly detection approach to network-wide traffic. Information Sciences, 348, 243–271.

    Article  Google Scholar 

  13. Sudharson, D., & Prabha, D. (2019). A novel machine learning approach for software reliability growth modelling with Pareto distribution function. Springer.

    Book  Google Scholar 

  14. Azhaguramyaa, V. R., Srinivasan, K., Rajasekar, P., Lokeshwaran, A., & Manoj Kumar, T. L. (2018). A study of specimen classification of an image using machine learning. Journal of Advanced Research in Dynamical and Control Systems, 10(12), 1037–1039.

    Google Scholar 

  15. Pushpalatha, A. (2018). Survey on swarm optimization algorithms. Journal of Advanced Research in Dynamical and Control Systems, 12(special issue), 1117–1120.

    Google Scholar 

  16. Yang, X. S. (2010). A new metaheuristic bat-inspired algorithm. In Nature inspired cooperative strategies for optimization (NICSO 2010) (pp. 65–74). Springer

  17. Yang, X. S., & HosseinGandomi, A. (2012). Bat algorithm: A novel approach for global engineering optimization. Engineering Computations, 29(5), 464–483.

    Article  Google Scholar 

  18. Yang, X.-S., & He, X. (2013). Bat algorithm: Literature review and applications. International Journal of Bio-Inspired Computation, 5(3), 141–149.

    Article  Google Scholar 

  19. Fister, I., Jr., et al. (2015). Particle swarm optimization for automatic creation of complex graphic characters. Chaos, Solitons and Fractals, 73, 29–35.

    Article  MathSciNet  Google Scholar 

  20. Yang, X.-S. (2011). Bat algorithm for multi-objective optimisation. International Journal of Bio-Inspired Computation, 3(5), 267–274.

    Article  Google Scholar 

  21. Yao, H., Gao, P., Wang, J., Zhang, P., Jiang, C., & Han, Z. (2019). Capsule network assisted IoT traffic classification mechanism for smart cities. IEEE Internet of Things Journal, 6(5), 7515–7525.

    Article  Google Scholar 

  22. Dwivedi, S., Vardhan, M., Tripathi, S., & Shukla, A. K. (2020). Implementation of adaptive scheme in evolutionary technique for anomaly-based intrusion detection. Evolutionary Intelligence, 13(1), 103–117.

    Article  Google Scholar 

  23. Dwivedi, S., Vardhan, M., & Tripathi, S. (2020). Defense against distributed DoS attack detection by using intelligent evolutionary algorithm. International Journal of Computers and Applications, 1–11.

  24. Shukla, A. K. (2020). An efficient hybrid evolutionary approach for identification of zero-day attacks on wired/wireless network system. Wireless Personal Communications, 1–29.

  25. Dwivedi, S., Vardhan, M., & Tripathi, S. (2021). Building an efficient intrusion detection system using grasshopper optimization algorithm for anomaly detection. Cluster Computing, 1–20.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to H. Azath.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Azath, H., Devi Mani, M., Prasanna Venkatesan, G.K.D. et al. Identification of IoT Device From Network Traffic Using Artificial Intelligence Based Capsule Networks. Wireless Pers Commun 123, 2227–2243 (2022). https://doi.org/10.1007/s11277-021-09236-y

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-021-09236-y

Keywords

Navigation