{"id":"https://openalex.org/W3092066520","doi":"https://doi.org/10.1145/3421537.3421545","title":"Network Traffic Analysis based IoT Device Identification","display_name":"Network Traffic Analysis based IoT Device Identification","publication_year":2020,"publication_date":"2020-08-22","ids":{"openalex":"https://openalex.org/W3092066520","doi":"https://doi.org/10.1145/3421537.3421545","mag":"3092066520"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/3421537.3421545","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2009.04682","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5020244707","display_name":"Rajarshi Roy Chowdhury","orcid":"https://orcid.org/0000-0001-9235-3687"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Rajarshi Roy Chowdhury","raw_affiliation_strings":["Faculty of Integrated Technologies"],"affiliations":[{"raw_affiliation_string":"Faculty of Integrated Technologies","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039427686","display_name":"Sandhya Aneja","orcid":"https://orcid.org/0000-0003-2266-4951"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Sandhya Aneja","raw_affiliation_strings":["Faculty of Integrated Technologies"],"affiliations":[{"raw_affiliation_string":"Faculty of Integrated Technologies","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072569465","display_name":"Nagender Aneja","orcid":"https://orcid.org/0000-0003-4681-6411"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Nagender Aneja","raw_affiliation_strings":["Institute of Applied Data Analytics"],"affiliations":[{"raw_affiliation_string":"Institute of Applied Data Analytics","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5063099921","display_name":"Emeroylariffion Abas","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Emeroylariffion Abas","raw_affiliation_strings":["Faculty of Integrated Technologies"],"affiliations":[{"raw_affiliation_string":"Faculty of Integrated Technologies","institution_ids":[]}]}],"institution_assertions":[],"countries_distinct_count":0,"institutions_distinct_count":0,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.426,"has_fulltext":false,"cited_by_count":26,"citation_normalized_percentile":{"value":0.80582,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"79","last_page":"89"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9996,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9958,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.6570138},{"id":"https://openalex.org/keywords/identification","display_name":"Identification","score":0.613588},{"id":"https://openalex.org/keywords/header","display_name":"Header","score":0.52501065},{"id":"https://openalex.org/keywords/networking-hardware","display_name":"Networking hardware","score":0.4927328}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.80243707},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.6570138},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.613588},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5808464},{"id":"https://openalex.org/C154504017","wikidata":"https://www.wikidata.org/wiki/Q853614","display_name":"Identifier","level":2,"score":0.5702327},{"id":"https://openalex.org/C2777826928","wikidata":"https://www.wikidata.org/wiki/Q3745713","display_name":"Fingerprint (computing)","level":2,"score":0.5667495},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.53008354},{"id":"https://openalex.org/C48105269","wikidata":"https://www.wikidata.org/wiki/Q1141160","display_name":"Header","level":2,"score":0.52501065},{"id":"https://openalex.org/C159631557","wikidata":"https://www.wikidata.org/wiki/Q1546066","display_name":"Networking hardware","level":2,"score":0.4927328},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.41790724},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.32796168},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.25386786},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/3421537.3421545","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},{"is_oa":true,"landing_page_url":"https://arxiv.org/abs/2009.04682","pdf_url":"https://arxiv.org/pdf/2009.04682","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":["Cornell University"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://arxiv.org/abs/2009.04682","pdf_url":"https://arxiv.org/pdf/2009.04682","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":["Cornell University"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false},"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":13,"referenced_works":["https://openalex.org/W1874399837","https://openalex.org/W1978973474","https://openalex.org/W1995875735","https://openalex.org/W2618506493","https://openalex.org/W2763448549","https://openalex.org/W2887149310","https://openalex.org/W2888505697","https://openalex.org/W2895909303","https://openalex.org/W2944968054","https://openalex.org/W2961816263","https://openalex.org/W3101877327","https://openalex.org/W4234713688","https://openalex.org/W4245409806"],"related_works":["https://openalex.org/W630850086","https://openalex.org/W4372053344","https://openalex.org/W3200508093","https://openalex.org/W3193978431","https://openalex.org/W2998478967","https://openalex.org/W2989910292","https://openalex.org/W2189136227","https://openalex.org/W2188559950","https://openalex.org/W2171597999","https://openalex.org/W1866537546"],"abstract_inverted_index":{"Device":[0],"identification":[1,36,91,197,212],"is":[2],"the":[3,82,119,127,184,196],"process":[4],"of":[5,22,26,42,156,186,193,198],"identifying":[6],"a":[7,39,49,97,112,144,154,164],"device":[8,35,90,98,113,128,145,148,170,187,201,210],"on":[9],"Internet":[10,25],"without":[11],"using":[12,100,207],"its":[13,116],"assigned":[14],"network":[15,105,150],"or":[16,60],"other":[17,56],"credentials.":[18],"The":[19],"sharp":[20],"rise":[21],"usage":[23],"in":[24,34,84,195],"Things":[27],"(IoT)":[28],"devices":[29,53,70,74],"has":[30],"imposed":[31],"new":[32],"challenges":[33],"due":[37],"to":[38,66,126,142,216],"wide":[40],"variety":[41],"devices,":[43,86],"protocols":[44],"and":[45,130,191],"control":[46],"interfaces.":[47],"In":[48,133],"network,":[50],"conventional":[51],"IoT":[52,69,85,203],"identify":[54],"each":[55],"by":[57,99],"utilizing":[58,147],"IP":[59],"MAC":[61],"addresses,":[62],"which":[63,111,159,166],"are":[64,71,123],"prone":[65],"spoofing.":[67],"Moreover,":[68],"low":[72],"power":[73],"with":[75],"minimal":[76],"embedded":[77],"security":[78],"solution.":[79],"To":[80,172],"mitigate":[81],"issue":[83],"fingerprint":[87,146],"(DFP)":[88],"for":[89,115,169],"can":[92],"be":[93],"used.":[94],"DFP":[95],"identifies":[96],"implicit":[101],"identifiers,":[102],"such":[103],"as":[104],"traffic":[106],"(or":[107],"packets),":[108],"radio":[109],"signal,":[110],"used":[114,177],"communication":[117],"over":[118],"network.":[120],"These":[121],"identifiers":[122],"closely":[124],"related":[125],"hardware":[129],"software":[131],"features.":[132],"this":[134],"paper,":[135],"we":[136,176],"exploit":[137],"TCP/IP":[138],"packet":[139,165],"header":[140],"features":[141,162],"create":[143],"originated":[149],"packets.":[151],"We":[152,182],"present":[153],"set":[155],"three":[157],"metrics":[158],"separate":[160],"some":[161],"from":[163,202],"contribute":[167],"actively":[168],"identification.":[171],"evaluate":[173],"our":[174],"approach,":[175],"publicly":[178],"accessible":[179],"two":[180],"datasets.":[181],"observed":[183],"accuracy":[185,194,213],"genre":[188],"classification":[189],"99.37%":[190],"83.35%":[192],"an":[199],"individual":[200],"Sentinel":[204],"dataset.":[205],"However,":[206],"UNSW":[208],"dataset":[209],"type":[211],"reached":[214],"up":[215],"97.78%.":[217]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W3092066520","counts_by_year":[{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":8},{"year":2021,"cited_by_count":5}],"updated_date":"2025-01-03T00:51:12.682233","created_date":"2020-10-15"}