Citation
Kamal, Tabina and Hashim, Fazirulhisyam and A Rasid, Mohd. Fadlee and Ahmad, Faisul Arif
(2024)
On the passive fingerprinting attack for IoT device classification.
In: 7th IEEE International Symposium on Telecommunication Technologies 2024 (ISTT2024), 21-22 Oct. 2024, Langkawi Island, Malaysia. (pp. 138-143).
Abstract
The rapid growth of the Internet of Things (IoT), expected to exceed 29 billion devices by 2027, presents a significant security challenge. Device fingerprinting, which identifies devices through unique network traffic patterns, is a valuable security tool but can be exploited by attackers for undetectable reconnaissance. This paper explores the feasibility of passive traffic fingerprinting attacks from an attacker's perspective, focusing on a small-scale testbed with four devices from an undisclosed single vendor. Using minimal resources and open-source tools, traffic patterns were analyzed, confirming unique device behaviors. A Random Forest (RF) classifier was developed, demonstrating high precision with instances where 100% classification accuracy can be achieved in a specific experimental scenario using just two features: Source Port and Destination Port. Key aspects of the model included feature selection, hyperparameter tuning, and a tree depth optimization of 20. Notably, forward feature selection proved more effective than Principal Component Analysis (PCA). These preliminary results underscore the vulnerabilities of single-vendor IoT ecosystems and highlight the simplicity and replicability of this low-cost attack methodology. The ease with which attackers can implement this approach underscores the urgent need for robust defenses as IoT devices proliferate across various sectors.
Download File
![[img]](http://psasir.upm.edu.my/style/images/fileicons/text.png) |
Text
121553.pdf
- Published Version
Restricted to Repository staff only
Download (803kB)
|
|
Additional Metadata
Actions (login required)
 |
View Item |