AIセキュリティポータル K Program
DeviceRadar: Online IoT Device Fingerprinting in ISPs using Programmable Switches
Share
Abstract
Device fingerprinting can be used by Internet Service Providers (ISPs) to identify vulnerable IoT devices for early prevention of threats. However, due to the wide deployment of middleboxes in ISP networks, some important data, e.g., 5-tuples and flow statistics, are often obscured, rendering many existing approaches invalid. It is further challenged by the high-speed traffic of hundreds of terabytes per day in ISP networks. This paper proposes DeviceRadar, an online IoT device fingerprinting framework that achieves accurate, real-time processing in ISPs using programmable switches. We innovatively exploit "key packets" as a basis of fingerprints only using packet sizes and directions, which appear periodically while exhibiting differences across different IoT devices. To utilize them, we propose a packet size embedding model to discover the spatial relationships between packets. Meanwhile, we design an algorithm to extract the "key packets" of each device, and propose an approach that jointly considers the spatial relationships and the key packets to produce a neighboring key packet distribution, which can serve as a feature vector for machine learning models for inference. Last, we design a model transformation method and a feature extraction process to deploy the model on a programmable data plane within its constrained arithmetic operations and memory to achieve line-speed processing. Our experiments show that DeviceRadar can achieve state-of-the-art accuracy across 77 IoT devices with 40 Gbps throughput, and requires only 1.3% of the processing time compared to GPU-accelerated approaches.
Identifying and characterizing bashlite and mirai c&c servers
G. Bastos, W. M. Jr.
Published: 2019
Understanding the mirai botnet
M. Antonakakis, T. April
Published: 2017
Pinpointing hidden iot devices via spatial-temporal traffic fingerprinting
X. Ma, J. Qu
Published: 2020
You are what you broadcast: Identification of mobile and iot devices from (public) wifi
L. Yu, B. Luo
Published: 2020
Examining mirai’s battle over the internet of things
H. Griffioen, C. Doerr
Published: 2020
Iot SENTINEL: automated device-type identification for security enforcement in iot
M. Miettinen, S. Marchal
Published: 2017
Keeping the smart home private with smart(er) iot traffic shaping
N. J. Apthorpe, D. Y. Huang
Published: 2019
Peek-a-Boo: I see your smart home activities, even encrypted!
Abbas Acar, Hossein Fereidooni, Tigist Abera, Amit Kumar Sikder, Markus Miettinen, Hidayet Aksu, Mauro Conti, Ahmad-Reza Sadeghi, Selcuk Uluagac
Published: 8.8.2018
Traffic data repository at the WIDE project
K. Cho, K. Mitsuya
Published: 2000
Packet-Level Signatures for Smart Home Devices
R. Trimananda, J. Varmarken, A. Markopoulou, B. Demsky
Published: 2020
P4: programming protocol-independent packet processors
Pat Bosshart, Dan Daly, Glen Gibb, Martin Izzard, Nick McKeown, Jennifer Rexford, Cole Schlesinger, Dan Talayco, Amin Vahdat, George Varghese, David Walker
Published: 2014
Passive data link layer 802.11 wireless device driver fingerprinting
J. Franklin, D. McCoy
Published: 2006
Gtid: A technique for physical device and device type fingerprinting
S. V. Radhakrishnan, A. S. Uluagac, R. Beyah
Published: 2015
Homesnitch: behavior transparency and control for smart home iot devices
T. J. OConnor, R. Mohamed
Published: 2019
HANZO: collaborative network defense for connected things
A. Singh, S. Murali
Published: 2018
A haystack full of needles: Scalable detection of iot devices in the wild
Said Jawad Saidi, Anna Maria Mandalari, Roman Kolcun, Hamed Haddadi, Daniel J Dubois, David Choffnes, Georgios Smaragdakis, Anja Feldmann
Published: 2020
Iotfinder: Efficient large-scale identification of iot devices via passive DNS traffic analysis
R. Perdisci, T. Papastergiou
Published: 2020
Middleboxes in the internet: A HTTP perspective
S. Huang, F. Cuadrado
Published: 2017
Your Smart Home Can't Keep a Secret: Towards Automated Fingerprinting of IoT Traffic with Neural Networks
Shuaike Dong, Zhou Li, Di Tang, Jiongyi Chen, Menghan Sun, Kehuan Zhang
Published: 8.31.2019
A novel approach for detecting vulnerable IoT devices connected behind a home NAT
Yair Meidan, Vinay Sachidananda, Hongyi Peng, Racheli Sagron, Yuval Elovici, Asaf Shabtai
Published: 2020
Byteiot: A practical iot device identification system based on packet length distribution
C. Duan, H. Gao
Published: 2022
DEFT: A distributed iot fingerprinting technique
V. Thangavelu, D. M. Divakaran
Published: 2019
Detecting consumer iot devices through the lens of an isp
S. J. Saidi, A. M. Mandalari
Published: 2021
Lumos: Identifying and localizing diverse hidden IoT devices in an unfamiliar environment
R. A. Sharma, E. Soltanaghaei
Published: 2022
Silkroad: Making stateful layer-4 load balancing fast and cheap using switching asics
R. Miao, H. Zeng
Published: 2017
Continuous in-network round-trip time monitoring
S. Sengupta, H. Kim
Published: 2022
P4guard: Designing P4 based firewall
R. Datta, S. Choi
Published: 2018
Do switches dream of machine learning?: Toward in-network classification
Z. Xiong, N. Zilberman
Published: 2019
Programmable switches for in-networking classification
B. M. Xavier, R. S. Guimaraes
Published: 2021
Mousika: Enable general in-network intelligence in programmable switches by knowledge distillation
G. Xie, Q. Li
Published: 2022
Information Exposure for Consumer IoT Devices: A Multidimensional, Network-Informed Measurement Approach
J. Ren, D.J. Dubois, D. Choffnes, A.M. Mandalari, R. Kolcun, H. Haddadi
Published: 2019
Classifying iot devices in smart environments using network traffic characteristics
Arunan Sivanathan, Hassan Habibi Gharakheili, Franco Loi, Adam Radford, Chamith Wijenayake, Arun Vishwanath, Vijay Sivaraman
Published: 2019
The Base-Rate Fallacy and the Difficulty of Intrusion Detection
Stefan Axelsson
Published: 2000
Inferring, characterizing, and investigating internet-scale malicious iot device activities: A network telescope perspective
S. Torabi, E. Bou-Harb
Published: 2018
Inferring the source of encrypted HTTP connections
M. Liberatore, B. N. Levine
Published: 2006
Share