Skip to main content

Network Device Identification Based on MAC Boundary Inference

  • Conference paper
  • First Online:
Advances in Artificial Intelligence and Security (ICAIS 2021)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1424))

Included in the following conference series:

Abstract

Network device is an important part of cyberspace, and accurate identification of network device is the basis of network management and security analysis. The current identification method based on MAC address is rely on converting MAC address and other information into fingerprints and MAC address distance to identify network device eventually. However, this identification method based on MAC address distance has high false alarm rate. A method for network device identification based on MAC boundary inference is proposed. Considering the device manufacturers’ strategies of allocating MAC addresses in sequence for devices with same type, the relationship between the type and MAC address is built according known devices firstly. Then, MAC address aggregation rule is built to infer the MAC prefix for those known type, and the MAC boundary is obtained. Finally, the type of target network device is identified by matching target MAC with MAC prefix, or calculating the distance between target MAC with the MAC boundary. The experimental result in simulation dataset show that the identification method proposed in this paper is better than the identification method based on MAC address distance significantly, and then been less affected by the distribution of MACs of known devices. And the experimental result in Cisco device dataset show that our method increases the identification accuracy rate of the identification method based on MAC address distance by 11.9%.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Gillivray, C.M., Reinsel, D.: IDC worldwide global data sphere IoT device and data forecast. IDC (2019)

    Google Scholar 

  2. Antiy Research Institute: Preliminary analysis and thinking enlightenment of Venezuela's massive blackout. Inf. Secur. Commun. Priv. (005), 28–39 (2019)

    Google Scholar 

  3. Feng, G.D., Zhang, Y., Zhang, Y.Q.: Overview of information security risk assessment. China Inst. Commun. 25(7), 10–18 (2004)

    Google Scholar 

  4. Baig, Z., Zeadally, S.: Cyber-security risk assessment framework for critical infrastructures. Intell. Autom. Soft Comput. 25(1), 121–129 (2019)

    Google Scholar 

  5. Antunes, J., Neves, N., Correia, M., Verissimo, P., Neves, R.: Vulnerability discovery with attack injection. IEEE Trans. Softw. Eng. 36(3), 357–370 (2010)

    Article  Google Scholar 

  6. Xi, R.R., Yun, X.C., Jin, S.Y., Zhang, Y.Z.: Research survey of network security situation awareness. Comput. Appl. 32(01), 1–4 (2012)

    Google Scholar 

  7. Han, W., Tian, Z., Huang, Z., Zhong, L., Jia, Y.: System architecture and key technologies of network security situation awareness system YHSAS. Comput. Mater. Continua 59(1), 167–180 (2019)

    Article  Google Scholar 

  8. Medeiros, J.P.S.L., Brito, A.M., Pires, P.S.M.: A data mining based analysis of nmap operating system fingerprint database. In: Herrero, Á., Gastaldo, P., Zunino, R., Corchado, E. (eds.) Computational Intelligence in Security for Information Systems, vol. 63, pp. 1–8. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-04091-7_1

    Chapter  Google Scholar 

  9. Yarochkin, F.V., Arkin, O., Kydyraliev, M.: Xprobe2++: low volume remote network information gathering tool. In: 2009 IEEE/IFIP International Conference on Dependable Systems & Networks, Lisbon, Portugal, pp. 205–210 (2009)

    Google Scholar 

  10. Beverly, R.: A robust classifier for passive TCP/IP fingerprinting. In: Barakat, C., Pratt, I. (eds.) PAM 2004. LNCS, vol. 3015, pp. 158–167. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24668-8_16

    Chapter  Google Scholar 

  11. Shamsi, Z., Nandwani, A., Leonard, D.: Hershel: single-packet OS fingerprinting. ACM SIGMETRICS Perform. Eval. Rev. 24(4), 195–206 (2016)

    Google Scholar 

  12. Matsunaka, T., Yamada, A., Kubota, A.: Passive OS fingerprinting by DNS traffic analysis. In: 2013 IEEE Workshops of 27th International Conference on Advanced Information Networking and Applications, Barcelona, Spain, pp. 243–250 (2013)

    Google Scholar 

  13. Radhakrishnan, S.V., Uluagac, A.S., Beyah, R.: GTID: A technique for physical device and device type fingerprinting. IEEE Trans. Dependable Secure Comput. 12(5), 519–532 (2015)

    Article  Google Scholar 

  14. Kohno, T., Broido, A., Claffy, K.C.: Remote physical device fingerprinting. IEEE Trans. Dependable Secure Comput. 2(2), 93–108 (2005)

    Article  Google Scholar 

  15. Cui, A., Stolfo, S.J.: A quantitative analysis of the insecurity of embedded network devices: results of a wide-area scan. In: the 26th Annual Computer Security Applications Conference, Austin Texas, AT, USA, pp. 97–106 (2010)

    Google Scholar 

  16. Li, Q., Feng, X., Wang, H.: Automatically discovering surveillance devices in the cyberspace. In: the 8th ACM on Multimedia Systems Conference, New York, NY, USA, pp. 331–342 (2017)

    Google Scholar 

  17. Pan, X., Wang, Z., Sun, Y.: Review of plc security issues in industrial control system. J. Cyber Secur. 2(2), 69–83 (2020)

    Article  Google Scholar 

  18. Martin, J., Rye, E., Beverly, R.: Decomposition of MAC address structure for granular device inference. In: Annual Computer Security Applications Conference, Los Angeles California, USA, pp. 78–88 (2016)

    Google Scholar 

  19. Niedermaier, M., Hanka, T., Plaga, S., von Bodisco, A., Merli, D.: Efficient passive ICS device discovery and identification by MAC address correlation. In: International Symposium for ICS & SCADA Cyber Security, Hamburg, Germany, pp. 21–30 (2018)

    Google Scholar 

Download references

Acknowledgments

This work was supported by the National Natural Science Foundation of China (No. U1636219).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiangyang Luo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Guo, X., Li, X., Li, R., Wang, X., Luo, X. (2021). Network Device Identification Based on MAC Boundary Inference. In: Sun, X., Zhang, X., Xia, Z., Bertino, E. (eds) Advances in Artificial Intelligence and Security. ICAIS 2021. Communications in Computer and Information Science, vol 1424. Springer, Cham. https://doi.org/10.1007/978-3-030-78621-2_58

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-78621-2_58

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-78620-5

  • Online ISBN: 978-3-030-78621-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics