Definition of the IoT Device Classes Based on Network Traffic Flow Features
- 14 Downloads
The IoT concept assumes a continuous increase in the number of devices which raises the problem of their classification for various purposes. So far, the device classes have been defined based on their semantic characteristics, purpose, functionality, or domain of use. This research intention is to define classes that are based on traffic flow features such as coefficient of variation of received and sent data ratio. Such defined classes can consolidate devices based on behavior predictability and can represent the foundation for the development of classification models for network management or network anomaly detection purposes.
KeywordsInternet of things Smart home Network anomaly Machine-type communication
- 1.Statista. (2018). Internet of Things (IoT) connected devices installed base worldwide from 2015 to 2025 (in billions). Retrieved June 24, 2018, from https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/.
- 2.Statista. (2018). The Internet of Things (IoT)∗ units installed base by category from 2014 to 2020 (in billions). Retrieved June 24, 2018, from https://www.statista.com/statistics/370350/internet-of-things-installed-base-by-category/.
- 3.Cvitić, I., Vujić, M., & Husnjak, S. (2016). Classification of security risks in the IoT environment. In 26-th Daaam international symposium on intelligent manufacturing and automation (pp. 0731–0740). https://doi.org/10.2507/26th.daaam.proceedings.102.Google Scholar
- 6.Laner, M., Svoboda, P., Nikaein, N., & Rupp, M. (2013). Traffic models for machine type communications. In 10th IEEE international symposium on wireless communication systems 2013, ISWCS 2013 (Vol. 9, pp. 651–655). Ilmenau, Germany: VDE.Google Scholar
- 7.Sivanathan, A., Sherratt, D., Gharakheili, H. H., Radford, A., Wijenayake, C., Vishwanath, A., & Sivaraman, V. (2017). Characterizing and classifying IoT traffic in smart cities and campuses. In 2017 IEEE conference on computer communications workshops, INFOCOM WKSHPS 2017 (pp. 559–564). Atlanta, USA: IEEE. https://doi.org/10.1109/INFCOMW.2017.8116438.
- 8.Meidan, Y., Bohadana, M., Shabtai, A., Ochoa, M., Tippenhauer, N. O., Guarnizo, J. D., & Elovici, Y. (2017). Detection of unauthorized IoT devices using machine learning techniques. arXiv. Retrieved from http://arxiv.org/abs/1709.04647.
- 9.Bai, L., Yao, L., Kanhere, S. S., Wang, X., & Yang, Z. (2018). Automatic device classification from network traffic streams of internet of things. Retrieved from http://arxiv.org/abs/1812.09882
- 10.Meidan, Y., Bohadana, M., Mathov, Y., Mirsky, Y., Breitenbacher, D., Shabtai, A., & Elovici, Y. (2018). N-BaIoT: Network-based detection of IoT botnet attacks using deep autoencoders. IEEE Pervasive Computing, 13(9), 1–8.Google Scholar
- 11.Sivanathan, A., Habibi Gharakheili, H., Loi, F., Radford, A., Wijenayake, C., Vishwanath, A., & Sivaraman, V. (2018). Classifying IoT devices in smart environments using network traffic characteristics. IEEE Transactions on Mobile Computing, 18, 1–1. https://doi.org/10.1109/TMC.2018.2866249.CrossRefGoogle Scholar
- 13.IHS. (2017). The internet of things: A movement, not a market start revolutionizing the competitive landscape. IHS Markit. Retrieved from https://ihsmarkit.com/Info/1017/internet-of-things.html.
- 16.Cvitić, I., Peraković, D., Periša, M., & Botica, M. (2018). Smart home IoT traffic characteristics as a basis for DDoS traffic detection. In Proceedings of the 3rd EAI international conference on management of manufacturing systems (pp. 1–10). EAI. https://doi.org/10.4108/eai.6-11-2018.2279336.
- 17.Karimi, A. M., Niyaz, Q., Sun, W., Javaid, A. Y., & Devabhaktuni, V. K. (2016). Distributed network traffic feature extraction for a real-time IDS. IEEE international conference on electro information technology, 2016–Augus, 522–526. https://doi.org/10.1109/EIT.2016.7535295.
- 18.Amar, Y., Haddadi, H., Mortier, R., Brown, A., Colley, J., & Crabtree, A. (2018). An analysis of home IoT network traffic and behaviour. arXiv:1803.05368. Retrieved from http://arxiv.org/abs/1803.05368.
- 19.Aghaei-Foroushani, V., & Zincir-Heywood, A. N. (2015). A proxy identifier based on patterns in traffic flows. In Proceedings of IEEE international symposium on high assurance systems engineering (pp. 118–125). IEEE. https://doi.org/10.1109/HASE.2015.26.
- 20.Habibi Lashkari, A., Draper Gil, G., Mamun, M. S. I., & Ghorbani, A. A. (2017). Characterization of Tor traffic using time based features, (Cic), 253–262. https://doi.org/10.5220/0006105602530262.
- 21.Doshi, R., Apthorpe, N., & Feamster, N. (2018). Machine learning DDoS detection for consumer internet of things devices. CoRR, abs/1804.04159. Retrieved from http://arxiv.org/abs/1804.04159.
- 24.Romano, F. L., Ambrosano, G. M. B., de Araújo Magnani, M. B. B., & Nouer, D. F. (2005). Analysis of the coefficient of variation in shear and tensile bond strength tests. Journal of applied oral science, 13(3), 243–246. Retrieved from http://www.ncbi.nlm.nih.gov/pubmed/20878024.CrossRefGoogle Scholar