Abstract
Nowadays, large-scale IoT (Internet of Things) devices are connected to the network. However, due to the simplicity, limited memory and poor computing power of most IoT devices, it is difficult to apply complex security authentication protocols to these devices. Many attackers use this loophole, impersonating legitimate devices to launch malicious attacks on the network, threatening the security of other legitimate devices. Therefore, in order to strengthen the identification and management of devices, the existing device fingerprint identification technology based on machine learning is to extract device traffic at the access gateway and generate device fingerprinting to realize the identification of IoT devices. However, to achieve high recognition accuracy, existing device fingerprint algorithms need to extract a large number of fingerprint features from network traffic for machine learning, which increases the complexity of implementation and delay of device identification. Also, it is not suitable for the current large-scale access environment. Therefore, this paper proposes a hybrid feature selection method to preprocess features for the optimal feature subset, which can not only reduce the feature dimension, but also improve the accuracy of device recognition. Firstly, the method filters the irrelevant features according to the characteristic fluctuation and the entropy of correlation information between the feature and the target. Then, based on the classification accuracy of the learning algorithm, a random search method—forest optimization algorithm is used to further optimize the filtered feature subsets under the evaluation criteria. Experiments show that this method can reduce feature dimension by 81.0% and improve classification accuracy from 86.4% to 93.1%.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Karie, N.M., Sahri, N.M., Haskell-Dowland, P.: Iot threat detection advances, challenges and future directions. In: 2020 IEEE Workshop on Emerging Technologies for Security in IoT (ETSecIoT) (2020)
Sen, R., Verma, A., Heim, G.R.: Impact of cyberattacks by malicious hackers on the competition in software markets. J. Manag. Inf. Syst. 37(1), 191–216 (2020)
Patsakis, C., Casino, F., Katos, V.: Encrypted and covert DNS queries for botnets: challenges and countermeasures. Comput. Secur. 88, 101614 (2020)
Wachter, S.: Normative challenges of identification in the internet of things: privacy, profiling, discrimination, and the gdpr. Comput. Law Secur. Rev. 34(3), 436–449 (2018)
Meidan, Y., et al.: Profiliot: a machine learning approach for iot device identification based on network traffic analysis. In: Proceedings of the symposium on applied computing, pp. 506–509 (2017)
Shahid, M.R., Blanc, G., Zhang, Z., Debar, H.: Iot devices recognition through network traffic analysis. In: 2018 IEEE International Conference on Big Data (Big Data) (2018)
Yang, K., Li, Q., Sun, L.: Towards automatic fingerprinting of iot devices in the cyberspace. Comput. Netw. 148, 318–327 (2019)
Miettinen, M., Marchal, S., Hafeez, I., Asokan, N., Sadeghi, A.R., Tarkoma, S.: Iot sentinel: Automated device-type identification for security enforcement in iot. In: 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), pp. 2177–2184. IEEE (2017)
Lei, S.: A feature selection method based on information gain and genetic algorithm. In: 2012 International Conference on Computer Science and Electronics Engineering. vol. 2, pp. 355–358. IEEE (2012)
Ghaemi, M., Feizi-Derakhshi, M.R.: Feature selection using forest optimization algorithm. Pattern Recognit.60, 121–129 (2016)
Xue, B., Zhang, M., Browne, W.N.: Novel initialisation and updating mechanisms in pso for feature selection in classification. In: European Conference on Applications of Evolutionary Computation (2013)
Xu, Y.: Research and implementation of improved random forest algorithm based on spark. In: 2017 IEEE 2nd International Conference on Big Data Analysis (ICBDA), pp. 499–503. IEEE (2017)
Aksoy, A., Gunes, M.H.: Automated iot device identification using network traffic. In: ICC 2019–2019 IEEE International Conference on Communications (ICC) (2019)
Song, Y., Huang, Q., Yang, J., Fan, M., Hu, A., Jiang, Y.: Iot device fingerprinting for relieving pressure in the access control. In: Proceedings of the ACM Turing Celebration Conference-China, pp. 1–8 (2019)
Hamad, S.A., Zhang, W.E., Sheng, Q.Z., Nepal, S.: Iot device identification via network-flow based fingerprinting and learning. In: 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE) (2019)
Funding
This work is supported in part by National Key Research and Development Program of China under Grant 2018YFB2100400.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Chen, Q., Song, Y., Hu, A., Wang, J. (2021). Automated Authentication of Large-Scale IoT Devices with Hybrid Feature Selection. In: Sun, X., Zhang, X., Xia, Z., Bertino, E. (eds) Advances in Artificial Intelligence and Security. ICAIS 2021. Communications in Computer and Information Science, vol 1424. Springer, Cham. https://doi.org/10.1007/978-3-030-78621-2_55
Download citation
DOI: https://doi.org/10.1007/978-3-030-78621-2_55
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-78620-5
Online ISBN: 978-3-030-78621-2
eBook Packages: Computer ScienceComputer Science (R0)