期刊文献+

一种基于流量指纹的物联网设备实时自动检测及识别 被引量:4

Real-Time Automatic Detection and Recognition of Internet of Things Equipment Based on Flow Fingerprint
在线阅读 下载PDF
导出
摘要 近年来,随着物联网(Internet of things,IoT)技术的飞速发展,网络空间中涌现了大量的物联网设备,例如网络打印机、网络摄像头和路由器.但是,网络安全状况越来越严重.由连接到互联网的终端设备发起的大规模网络攻击频繁发生,造成一系列不利影响,例如信息泄露和人员财产损失.建立一套用于物联网设备的指纹生成系统,以准确识别设备类型,对于物联网的统一安全控制具有重要意义.提出了一种基于流量指纹的物联网设备实时自动检测及识别方案,该方案包含2个主要模块:自动检测和指纹识别.首先通过被动侦听来收集由不同的物联网设备发送的消息.基于不同设备的标头字段的差异,使用一系列多分类算法来识别设备类型.仿真实验表明,该方案可以达到93.75%的平均预测精度. In recent years,with the rapid development of Internet of things(IoT)technology,a large number of Internet of Things devices have emerged in the cyberspace,such as network printers,network cameras and routers.However,the network security situation is getting worse.Large-scale network attacks initiated by terminal devices connected to the Internet frequently occur,causing a series of adverse effects,such as information leakage and personnel property damage.It is of great significance to the unified security control of the IoT to established a fingerprint generation system for IoT devices to accurately identify device types.We propose a real-time automatic detection and recognition solution for IoT devices based on traffic fingerprints.This solution contains two main modules,including automatic detection and fingerprint recognition.First,passive listening is used to collect messages sent by different IoT devices.Based on the differences in the header fields of different devices,a series of multi-classification algorithms are used to identify the device type.Simulation experiments show that the scheme can achieve an average prediction accuracy of 93.75%.
作者 徐超 王纪军 吴小虎 张明远 Xu Chao;Wang Jijun;Wu Xiaohu;and Zhang Mingyuan(Jiangsu Electric Power Information Technology Co.,Ltd.,Nanjing 210009)
出处 《信息安全研究》 2021年第6期543-549,共7页 Journal of Information Security Research
关键词 物联网 设备类型标识 设备指纹 网络安全 安全控制 Internet of things(IoT) device type identification device fingerprinting network security security control
作者简介 徐超,高级工程师.主要研究方向为网络空间安全.dayangxx@163.com;王纪军,硕士,高级工程师.主要研究方向为信息架构和安全.wjjdlxx@163.com;吴小虎,高级工程师.主要研究方向为网络空间安全.wxhdlxx@163.com;张明远,工程师.主要研究方向为网络空间安全.zmydlxx@163.com。
  • 相关文献

参考文献5

二级参考文献22

  • 1文伟平,卿斯汉,蒋建春,王业君.网络蠕虫研究与进展[J].软件学报,2004,15(8):1208-1219. 被引量:187
  • 2张成,周媛媛,林嘉宇.指纹采集技术及其产品发展趋势[J].电子技术应用,2004,30(8):1-3. 被引量:20
  • 3ZoomEye.网络设备统计分析[EB/OL].(2015-12-31)[2015-12-31].https://WWW.zoomeye.org/statistic/device.
  • 4Gallagher S. Backdoor in wireless DSL routers lets attacker reset router, get admin [ EB/OLI. (2014-01-03) [ 2015-12- 31 ]. http : /'/' arstechnica, com/security/2014/O1/backdoor-in- wireless-dsl-routers-lets-attacker-reset-router-get-admin/.
  • 5Chirgwin R. Hacker backdoors Linksys, Netgear, Cisco and otheh routers [ EB/OL]. (2014-01-06) [2015-12-31 ]. http:// www. theregister, co. uk/2014/01/06/hacker_ backdoors_ linksys_netgear_cisco_and_other_routers/.
  • 6国家互联网应急中心.关于多款D-LINK路由器产品存在后门漏洞的情况通报[EB/OL].(2013-10-25)[2015-12-31].http://WWW.celt.org.cn/publish/main/9/2013/20131025152943288740930/20131025152943288740930_.html.
  • 7Singh D, Sinha R, Songara P, et al. Vulnerabilities and attacks targeting social networks and industrial control systems [J]. Eprint Arxiv, 2014, 4(1) :133-142.
  • 8Shah S. An introduction to HTTP fingerprinting [ EB/OL]. (2004-05-19) [ 2015-12-31 ]. http:// net-square. com/ httprint_paper, html.
  • 9Lee D, Rowe J, Ko C, et al. Detecting and defending against Web-server fingerprinting [ C ]//CSAC 2002 : 2002 Computer Security Applications Conference. United States: IEEE Computer Society, 2002 : 321-330.
  • 10Fyodor. Remote OS detection via TCP/IP stack fingerprinting [J]. Phrack Magazine, 1998, 17(3): 1-10.

共引文献38

同被引文献16

引证文献4

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部