20
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Privacy-Preserving Detection of IoT Devices Connected Behind a NAT in a Smart Home Setup

      Preprint
      , , ,

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Today, telecommunication service providers (telcos) are exposed to cyber-attacks executed by compromised IoT devices connected to their customers' networks. Such attacks might have severe effects not only on the target of attacks but also on the telcos themselves. To mitigate those risks we propose a machine learning based method that can detect devices of specific vulnerable IoT models connected behind a domestic NAT, thereby identifying home networks that pose a risk to the telco's infrastructure and availability of services. As part of the effort to preserve the domestic customers' privacy, our method relies on NetFlow data solely, refraining from inspecting the payload. To promote future research in this domain we share our novel dataset, collected in our lab from numerous and various commercial IoT devices.

          Related collections

          Most cited references15

          • Record: found
          • Abstract: not found
          • Article: not found

          Network Traffic Classifier With Convolutional and Recurrent Neural Networks for Internet of Things

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            A Survey on Internet Traffic Identification

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              GTID: A Technique for Physical Device and Device Type Fingerprinting

                Bookmark

                Author and article information

                Journal
                31 May 2019
                Article
                1905.13430
                21bd69ba-bd68-402a-a9e5-fde20230f07f

                http://arxiv.org/licenses/nonexclusive-distrib/1.0/

                History
                Custom metadata
                cs.CR cs.LG cs.NI

                Security & Cryptology,Networking & Internet architecture,Artificial intelligence

                Comments

                Comment on this article