Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3502300.3502305acmotherconferencesArticle/Chapter ViewAbstractPublication PagesbdsicConference Proceedingsconference-collections
research-article

Automatic Smart Device Identification Based on Web Fingerprint and Neural Network

Published: 27 January 2022 Publication History

Abstract

Cyberspace smart devices refer to the general term for devices that can connect to the Internet and have data processing functions. With the development of the Internet of Things technology, new smart devices such as webcams have brought convenience to people's lives, but also exposed many security vulnerabilities. Discovering smart devices in cyberspace is the prerequisite and basis for implementing cyberspace security management. However, the traditional pattern matching identification method requires manual extraction of device keywords, and keeping the keywords intact and updating the fingerprint database hinders accurate and large-scale device discovery. In this regard, this paper proposes a smart device identification method based on Web fingerprints and neural network. We use asynchronous stateless scanning and web crawlers to obtain the target's HTTP response data, extract the text in the response data based on natural language processing technology, and use neural networks to build a classification model. After processing, the response data of each IP is converted into concise text as a feature vector, and these texts are finally used to train the neural network model to realize the identification of smart devices. In order to prove the effectiveness of the algorithm, this paper uses Python to implement a prototype system and conduct experimental verification to evaluate its performance. Experiments show that among the four neural network models used, the RCNN model can converge in the shortest time and reach a training accuracy of 98.66%, and an accuracy of 90.59% on the test set. It is verified that the algorithm proposed in this paper is feasible and has a good ability to recognize smart devices.

References

[1]
L. Guo, Y. N. Guo, M. Q. Su, Y. M. Shang, Y. J. Zhu, P. Zhang, et.al. “Cyberspace resource surveying and mapping: concept and technology,” Journal of Cyber Security, 2018, pp. 1-14.
[2]
R. M. Li, “Network scanning technology revealed,” Machinery Industry Press, 2012, pp. 1-18.
[3]
Q. Li, X. Feng, H. Wang, and L. M. Sun. “Automatically discovering surveillance devices in the cyberspace,” in Proceedings of the 8th ACM on Multimedia Systems Conference, 2017, pp. 331-342.
[4]
Z. Wang, “The applications of deep learning on traffic identification” (2015).
[5]
X. Feng, Q. Li, H. N. Wang, and L. M. Sun. “Acquisitional Rule-based Engine for Discovering Internet-of-Thing Devices” 27th USENIX Security Symposium, 2018, pp: 327-341.
[6]
S. S. Zhang, and J.Huang. “Fingerprint generation of IoT devices based on the characteristics of the login interface,” Cyberspace Security, 2020, vol. 11, no. 8, pp. 98-102.
[7]
C. L. Ren, Y. Gu, J. Cui, S. Liu, H. S. Zhu, and L M. Sun, “Identification method of specific type of Internet of Things terminal based on WEB information,” Communications Technology, 2017, vol. 50, no. 5, pp. 1003-1009.
[8]
L. C. Cao, J. J. Cao, X. Cui, and K. Li. “Network space terminal equipment identification based on K-means based on cosine measure,” Journal of University of Chinese Academy of Sciences, 2016, vol. 33, no. 04, pp. 562-569.
[9]
W. B. Feng, Z. Hong, L. F. Wu, and M. L. Lin. “Summary of network protocol identification technology,” Journal of Computer Applications, 2019, vol. 39, no. 12, pp. 3604-3614.
[10]
W. B. Feng, Z. Hong, L. F. Wu, and M. L. Lin. “Summary of network protocol identification technology,” Journal of Computer Applications, 2019, vol. 39, no. 12, pp. 3604-3614.
[11]
Shodan. 2014. The search engine for Internet-connected devices. (2014). https: //www.shodan.io/
[12]
Censys. 2016. A search engine for devices and networks based on Internet-wide scanning. (2016). https://censys.io/
[13]
L. Yao, H. Zhuang, Z. Lin, J. Gu, F. Wang and Q. Chen, "Research on Detection and Identification Technology of Intelligent Devices in Cyberspace: A Survey," 2021 4th International Conference on Artificial Intelligence and Big Data (ICAIBD), 2021, pp. 409-418
[14]
Daming D Chen, Manuel Egele, Maverick Woo, and David Brumley. 2016. Towards Automated Dynamic Analysis for Linux-based Embedded Firmware. In Network and Distributed System Security Symposium (NDSS)
[15]
Andrei Costin, Jonas Zaddach, Aurélien Francillon, and Davide Balzarotti. 2014. A Large-Scale Analysis of the Security of Embedded Firmwares. In 23rd USENIX Security Symposium. San Diego, CA, 95–110
[16]
JinKe Song,Qiang Li,Haining Wang,Limin Sun. Under the Concealing Surface: Detecting and Understanding Live Webcams in the Wild. Measurement and Modeling of Computer Systems,2020, pp.1-25

Cited By

View all
  • (2022)Eagle-Eye: Open-Source Intelligence Tool for IoT Devices Detection2022 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)10.1109/3ICT56508.2022.9990658(526-530)Online publication date: 20-Nov-2022

Index Terms

  1. Automatic Smart Device Identification Based on Web Fingerprint and Neural Network
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Please enable JavaScript to view thecomments powered by Disqus.

          Information & Contributors

          Information

          Published In

          cover image ACM Other conferences
          BDSIC '21: Proceedings of the 2021 3rd International Conference on Big-data Service and Intelligent Computation
          November 2021
          111 pages
          ISBN:9781450390552
          DOI:10.1145/3502300
          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          Published: 27 January 2022

          Permissions

          Request permissions for this article.

          Check for updates

          Author Tags

          1. crawlers
          2. cyberspace security
          3. fingerprint
          4. identification
          5. smart devices
          6. webpage

          Qualifiers

          • Research-article
          • Research
          • Refereed limited

          Conference

          BDSIC 2021

          Contributors

          Other Metrics

          Bibliometrics & Citations

          Bibliometrics

          Article Metrics

          • Downloads (Last 12 months)27
          • Downloads (Last 6 weeks)5
          Reflects downloads up to 21 Nov 2024

          Other Metrics

          Citations

          Cited By

          View all
          • (2022)Eagle-Eye: Open-Source Intelligence Tool for IoT Devices Detection2022 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)10.1109/3ICT56508.2022.9990658(526-530)Online publication date: 20-Nov-2022

          View Options

          Login options

          View options

          PDF

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          HTML Format

          View this article in HTML Format.

          HTML Format

          Media

          Figures

          Other

          Tables

          Share

          Share

          Share this Publication link

          Share on social media