Skip to main content

Toward Home Area Network Hygiene: Device Classification and Intrusion Detection for Encrypted Communications

Part of the Transactions on Computational Science and Computational Intelligence book series (TRACOSCI)

Abstract

With the abundance of Internet of Things (IoT) devices on the market, proper home area network (HAN) hygiene is not only desirable for easy management and maintenance but also a requirement at the foundation of any security measures. To ensure HAN hygiene, a method is proposed for automatic device detection and classification. Given the popularity of dynamic IP address allocation, and the increasing popularity of end-to-end encrypted communications, this method relies solely on communication metadata that can be extracted from network traffic. But rather than extracting explicit statistical features of traffic over sliding or hopping windows, this method instead uses entire sequences of packets, where each packet is represented by a tuple describing its length and the duration of the associated subsequent interpacket pause. The proposed classifier is implemented as a recurrent neural network and achieves encouraging accuracy, demonstrating that even the simplest form of communication metadata (and thus the least privacy invasive) is a valuable resource for keeping track of the devices on our networks.

Most appropriate tracks: Computer Security: Intrusion Detection; Network Security: Network Security Engineering

Keywords

  • Intrusion detection
  • Neural network
  • LSTM
  • Device detection
  • Classification

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   299.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   299.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Z. Zhang, J. Li, C. Manikopoulos, J. Jorgenson, J. Ucles, Hide: a hierarchical network intrusion detection system using statistical preprocessing and neural network classification, in Proceedings of the IEEE Workshop on Information Assurance and Security (2001), pp. 85–90

    Google Scholar 

  2. J.Z. Lei, A. Ghorbani, Network intrusion detection using an improved competitive learning neural network, in Proceedings. Second Annual Conference on Communication Networks and Services Research, 2004 (IEEE, New York, 2004), pp. 190–197

    Google Scholar 

  3. S.M. Botros, T.A. Diep, M.D. Izenson, Method and apparatus for training a neural network model for use in computer network intrusion detection, Jul. 27 2004, US Patent 6,769,066

    Google Scholar 

  4. E. Hodo, X. Bellekens, A. Hamilton, P.-L. Dubouilh, E. Iorkyase, C. Tachtatzis, R. Atkinson, Threat analysis of IoT networks using artificial neural network intrusion detection system, in 2016 International Symposium on Networks, Computers and Communications (ISNCC) (IEEE, New York, 2016), pp. 1–6

    Google Scholar 

  5. B. Radford, L. Apalonio, A. Trias, J. Simpson, Network traffic anomaly detection using recurrent neural networks (2018). https://arxiv.org/abs/1803.10769 (Accessed: May 25, 2021)

  6. T. Le, Y. Kim, H. Kim, Network intrusion detection based on novel feature selection model and various recurrent neural networks. Appl. Sci. 9, 1392 (2019)

    CrossRef  Google Scholar 

  7. I. Riadi, A.W. Muhammad, Network packet classification using neural network based on training function and hidden layer neuron number variation. Network 8(6) (2017). https://doi.org/10.14569/IJACSA.2017.080631

  8. A. Bivens, C. Palagiri, R. Smith, B. Szymanski, M. Embrechts, Network-based intrusion detection using neural networks, in Intelligent Engineering Systems Through Artificial Neural Networks, vol. 12 (2002)

    Google Scholar 

  9. K.S. Devikrishna, B. Ramakrishna, An artificial neural network based intrusion detection system and classification of attacks. Int. J. Eng. Res. Appl. 3, 1959–1964 (2013)

    Google Scholar 

  10. N. Chawla, K. Bowyer, L. Hall, W. Kegelmeyer, SMOTE: synthetic minority over-sampling technique. J. Artif. Intell. Res. 16, 321–357 (2002)

    CrossRef  Google Scholar 

Download references

Acknowledgements

This work was supported in part by the US National Science Foundation under grant numbers 1527579 and 1619201.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Blake A. Holman .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Holman, B.A., Hauser, J., Amariucai, G.T. (2021). Toward Home Area Network Hygiene: Device Classification and Intrusion Detection for Encrypted Communications. In: Daimi, K., Arabnia, H.R., Deligiannidis, L., Hwang, MS., Tinetti, F.G. (eds) Advances in Security, Networks, and Internet of Things. Transactions on Computational Science and Computational Intelligence. Springer, Cham. https://doi.org/10.1007/978-3-030-71017-0_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-71017-0_14

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-71016-3

  • Online ISBN: 978-3-030-71017-0

  • eBook Packages: EngineeringEngineering (R0)