Abstract
With the abundance of Internet of Things (IoT) devices on the market, proper home area network (HAN) hygiene is not only desirable for easy management and maintenance but also a requirement at the foundation of any security measures. To ensure HAN hygiene, a method is proposed for automatic device detection and classification. Given the popularity of dynamic IP address allocation, and the increasing popularity of end-to-end encrypted communications, this method relies solely on communication metadata that can be extracted from network traffic. But rather than extracting explicit statistical features of traffic over sliding or hopping windows, this method instead uses entire sequences of packets, where each packet is represented by a tuple describing its length and the duration of the associated subsequent interpacket pause. The proposed classifier is implemented as a recurrent neural network and achieves encouraging accuracy, demonstrating that even the simplest form of communication metadata (and thus the least privacy invasive) is a valuable resource for keeping track of the devices on our networks.
Most appropriate tracks: Computer Security: Intrusion Detection; Network Security: Network Security Engineering
Keywords
- Intrusion detection
- Neural network
- LSTM
- Device detection
- Classification
This is a preview of subscription content, access via your institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Z. Zhang, J. Li, C. Manikopoulos, J. Jorgenson, J. Ucles, Hide: a hierarchical network intrusion detection system using statistical preprocessing and neural network classification, in Proceedings of the IEEE Workshop on Information Assurance and Security (2001), pp. 85–90
J.Z. Lei, A. Ghorbani, Network intrusion detection using an improved competitive learning neural network, in Proceedings. Second Annual Conference on Communication Networks and Services Research, 2004 (IEEE, New York, 2004), pp. 190–197
S.M. Botros, T.A. Diep, M.D. Izenson, Method and apparatus for training a neural network model for use in computer network intrusion detection, Jul. 27 2004, US Patent 6,769,066
E. Hodo, X. Bellekens, A. Hamilton, P.-L. Dubouilh, E. Iorkyase, C. Tachtatzis, R. Atkinson, Threat analysis of IoT networks using artificial neural network intrusion detection system, in 2016 International Symposium on Networks, Computers and Communications (ISNCC) (IEEE, New York, 2016), pp. 1–6
B. Radford, L. Apalonio, A. Trias, J. Simpson, Network traffic anomaly detection using recurrent neural networks (2018). https://arxiv.org/abs/1803.10769 (Accessed: May 25, 2021)
T. Le, Y. Kim, H. Kim, Network intrusion detection based on novel feature selection model and various recurrent neural networks. Appl. Sci. 9, 1392 (2019)
I. Riadi, A.W. Muhammad, Network packet classification using neural network based on training function and hidden layer neuron number variation. Network 8(6) (2017). https://doi.org/10.14569/IJACSA.2017.080631
A. Bivens, C. Palagiri, R. Smith, B. Szymanski, M. Embrechts, Network-based intrusion detection using neural networks, in Intelligent Engineering Systems Through Artificial Neural Networks, vol. 12 (2002)
K.S. Devikrishna, B. Ramakrishna, An artificial neural network based intrusion detection system and classification of attacks. Int. J. Eng. Res. Appl. 3, 1959–1964 (2013)
N. Chawla, K. Bowyer, L. Hall, W. Kegelmeyer, SMOTE: synthetic minority over-sampling technique. J. Artif. Intell. Res. 16, 321–357 (2002)
Acknowledgements
This work was supported in part by the US National Science Foundation under grant numbers 1527579 and 1619201.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Holman, B.A., Hauser, J., Amariucai, G.T. (2021). Toward Home Area Network Hygiene: Device Classification and Intrusion Detection for Encrypted Communications. In: Daimi, K., Arabnia, H.R., Deligiannidis, L., Hwang, MS., Tinetti, F.G. (eds) Advances in Security, Networks, and Internet of Things. Transactions on Computational Science and Computational Intelligence. Springer, Cham. https://doi.org/10.1007/978-3-030-71017-0_14
Download citation
DOI: https://doi.org/10.1007/978-3-030-71017-0_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-71016-3
Online ISBN: 978-3-030-71017-0
eBook Packages: EngineeringEngineering (R0)