Paper
19 October 2022 IoT device identification method based on CNN+SVM
Shan Liu, Ziqiang Zhou, Yao Wang, Shaobo Wang, Shu Yang
Author Affiliations +
Proceedings Volume 12294, 7th International Symposium on Advances in Electrical, Electronics, and Computer Engineering; 1229437 (2022) https://doi.org/10.1117/12.2639694
Event: 7th International Symposium on Advances in Electrical, Electronics and Computer Engineering (ISAEECE 2022), 2022, Xishuangbanna, China
Abstract
The Internet of Things allows everything to be interconnected, but there is also the risk of malicious devices or vulnerable devices causing damage to the network. In order to avoid this risk, how to accurately identify which devices are connected to the network in a resource-limited IoT environment becomes an urgent problem to be solved. Identification by extracting network traffic features as device fingerprints is a more effective and low-interference method today. This paper proposes a device identification method based on device traffic fingerprints, which utilizes convolutional neural networks (CNN) to extract features from device network traffic, and then uses SVM for device classification. The experimental results show that, compared with the CNN method and the method of manually extracting features, the identification accuracy and stability of the method proposed in this paper are significantly improved.
© (2022) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Shan Liu, Ziqiang Zhou, Yao Wang, Shaobo Wang, and Shu Yang "IoT device identification method based on CNN+SVM", Proc. SPIE 12294, 7th International Symposium on Advances in Electrical, Electronics, and Computer Engineering, 1229437 (19 October 2022); https://doi.org/10.1117/12.2639694
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Data modeling

Instrument modeling

Convolutional neural networks

Feature extraction

Data conversion

Machine learning

Network security

Back to Top