{"id":1197,"date":"2018-06-14T10:38:37","date_gmt":"2018-06-14T17:38:37","guid":{"rendered":"https:\/\/ant.isi.edu\/blog\/?p=1197"},"modified":"2020-10-14T15:36:34","modified_gmt":"2020-10-14T22:36:34","slug":"new-workshop-paper-ip-based-iot-device-detection","status":"publish","type":"post","link":"https:\/\/ant.isi.edu\/blog\/?p=1197","title":{"rendered":"New workshop paper &#8220;IP-Based IoT Device Detection&#8221;"},"content":{"rendered":"<p>We have published a new paper &#8220;<a href=\"https:\/\/www.isi.edu\/%7ejohnh\/PAPERS\/Guo18a.html\">IP-Based IoT Device Detection<\/a>&#8221; in the Second ACM <a href=\"https:\/\/conferences.sigcomm.org\/sigcomm\/2018\/workshop-iotsp.html\">Workshop on Internet-of-Things Security and Privacy<\/a> (IoTS&amp;P 2018) in Budapest, Hungary, co-located with SIGCOMM 2018.<\/p>\n<p><figure id=\"attachment_1199\" aria-describedby=\"caption-attachment-1199\" style=\"width: 604px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/ant.isi.edu\/blog\/wp-content\/uploads\/2018\/06\/Screenshot-from-2018-06-12-22-15-49-e1528857374848.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-1199\" src=\"https:\/\/ant.isi.edu\/blog\/wp-content\/uploads\/2018\/06\/Screenshot-from-2018-06-12-22-15-49-e1528857374848-300x70.png\" alt=\"\" width=\"604\" height=\"141\" srcset=\"https:\/\/ant.isi.edu\/blog\/wp-content\/uploads\/2018\/06\/Screenshot-from-2018-06-12-22-15-49-e1528857374848-300x70.png 300w, https:\/\/ant.isi.edu\/blog\/wp-content\/uploads\/2018\/06\/Screenshot-from-2018-06-12-22-15-49-e1528857374848-1024x241.png 1024w, https:\/\/ant.isi.edu\/blog\/wp-content\/uploads\/2018\/06\/Screenshot-from-2018-06-12-22-15-49-e1528857374848-768x180.png 768w, https:\/\/ant.isi.edu\/blog\/wp-content\/uploads\/2018\/06\/Screenshot-from-2018-06-12-22-15-49-e1528857374848-1536x361.png 1536w, https:\/\/ant.isi.edu\/blog\/wp-content\/uploads\/2018\/06\/Screenshot-from-2018-06-12-22-15-49-e1528857374848.png 1673w\" sizes=\"auto, (max-width: 604px) 100vw, 604px\" \/><\/a><figcaption id=\"caption-attachment-1199\" class=\"wp-caption-text\">IoT devices we detect in use at a campus (Table 3 from [Guo18b])<\/figcaption><\/figure>From the abstract of our&nbsp; paper:<\/p>\n<blockquote><p>Recent IoT-based DDoS attacks have exposed how vulnerable the Internet can be to millions of insufficiently secured IoT devices. To understand the risks of these attacks requires<br \/>\nlearning about these IoT devices\u2014where are they, how many are there, how are they changing? In this paper, we propose<br \/>\na new method to find IoT devices in Internet to begin to assess this threat. Our approach requires observations of flow-level network traffic and knowledge of servers run by<br \/>\nthe manufacturers of the IoT devices. We have developed our approach with 10 device models by 7 vendors and controlled<br \/>\nexperiments. We apply our algorithm to observations from 6 days of Internet traffic at a college campus and partial traffic<br \/>\nfrom an IXP to detect IoT devices.<\/p><\/blockquote>\n<p>We make operational traffic we captured from 10 IoT devices we own public at&nbsp;<a href=\"https:\/\/ant.isi.edu\/datasets\/iot\/\">https:\/\/ant.isi.edu\/datasets\/iot\/.<\/a> We also use operational traffic of 21 IoT devices shared by&nbsp;University of New South Wales at&nbsp;http:\/\/149.171.189.1\/.<\/p>\n<p>This paper is joint work of Hang Guo and &nbsp;John Heidemann from USC\/ISI.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We have published a new paper &#8220;IP-Based IoT Device Detection&#8221; in the Second ACM Workshop on Internet-of-Things Security and Privacy (IoTS&amp;P 2018) in Budapest, Hungary, co-located with SIGCOMM 2018. From the abstract of our&nbsp; paper: Recent IoT-based DDoS attacks have exposed how vulnerable the Internet can be to millions of insufficiently secured IoT devices. To [&hellip;]<\/p>\n","protected":false},"author":632,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[284,282],"tags":[141,71,157,200,199,58,191,22,10,29,5,170,18,57,38],"class_list":["post-1197","post","type-post","status-publish","format-standard","hentry","category-papers-publications","category-publications","tag-ant","tag-datasets","tag-impact","tag-iot","tag-iotsp","tag-isi","tag-lacanic","tag-measurement-systems","tag-network-datasets","tag-network-traffic","tag-papers","tag-retrofuturebridge","tag-security","tag-usc","tag-workshop"],"_links":{"self":[{"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=\/wp\/v2\/posts\/1197","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=\/wp\/v2\/users\/632"}],"replies":[{"embeddable":true,"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1197"}],"version-history":[{"count":6,"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=\/wp\/v2\/posts\/1197\/revisions"}],"predecessor-version":[{"id":1561,"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=\/wp\/v2\/posts\/1197\/revisions\/1561"}],"wp:attachment":[{"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1197"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1197"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1197"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}