首页> 外文会议>European symposium on research in computer security;International workshop on policy-based autonomic data governance >Policy-Based Identification of IoT Devices' Vendor and Type by DNS Traffic Analysis
【24h】

Policy-Based Identification of IoT Devices' Vendor and Type by DNS Traffic Analysis

机译:通过DNS流量分析基于策略的物联网设备供应商和类型识别

获取原文

摘要

The explosive growth of IoT devices and the weak security protection in some types of devices makes them an attractive target for attackers. IoT devices can become a vulnerable weak link for penetrating a secure IT infrastructure. The risks are exacerbated by the Bring-Your-Own-Device trend that allows employees to connect their own personal devices into an enterprise network. Currently, network administrators lack adequate tools to discover and manage IoT devices in their environments. A good tool to address this requirement can be created by adapting and applying natural language interpretation algorithms to network traffic. In this paper, we show that an application of algorithms like Term Frequency - Inverse Document Frequency (TF-IDF) to the domain name resolution process, a required first step in every Internet based communication, can be highly effective to determine IoT devices, their manufacturers and their type. By treating the domain names being resolved as words, and the set of domain names queried by a device as a document, then comparing these synthetic documents from a reference data set to real traffic results in a very effective approach for IoT discovery. Evaluation of our approach on a traffic data set shows that the approach can identify 84% of the instances, with an accuracy of 91% for the IoT devices' vendor, and 100% of the instances with an accuracy of 94% for the IoT devices' type. We believe that this is the first attempt to apply natural language processing algorithms for traffic analysis, and the promising results could open new venues for securing and understanding computer networks through natural language processing algorithms. These and other techniques require policies to determine how the large volume of data will be handled efficiently. By assisting in detecting potential malicious devices, this paper contributes to the topic of safe autonomy.
机译:物联网设备的爆炸性增长和某些类型的设备中薄弱的安全保护使其成为攻击者的诱人目标。物联网设备可能会成为渗透安全IT基础架构的脆弱薄弱环节。自带设备的趋势使员工将自己的个人设备连接到企业网络中的趋势加剧了这些风险。当前,网络管理员缺乏在其环境中发现和管理IoT设备的适当工具。通过适应自然语言解释算法并将其应用于网络流量,可以创建满足此要求的良好工具。在本文中,我们表明,将诸如术语频率-逆文档频率(TF-IDF)之类的算法应用于域名解析过程(这是每个基于Internet的通信中必不可少的第一步),可以非常有效地确定IoT设备及其制造商及其类型。通过将解析为域名的域名视为单词,并将设备查询的域名集作为文档,然后将这些合成文档从参考数据集中与实际流量进行比较,可得出一种非常有效的物联网发现方法。对我们对流量数据集的方法的评估表明,该方法可以识别84%的实例,对于IoT设备的供应商,其准确性为91%;对于100%的实例,对于IoT设备,则为94%的准确性。 '类型。我们认为,这是将自然语言处理算法应用于流量分析的首次尝试,而令人鼓舞的结果可能会为通过自然语言处理算法保护和理解计算机网络开辟新的场所。这些技术和其他技术需要策略来确定如何有效处理大量数据。通过协助检测潜在的恶意设备,本文为安全自治这一主题做出了贡献。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号