Research Article
Identifying IoT Devices Based on Spatial and Temporal Features from Network Traffic
Table 1
Summary of related works.
| References | Features | Method |
| [14–17] | Clock skew | — | [18–21] | Radio frequency fingerprint | — | [22] | Clock skew | ANNs | [23] | Features from the packet head | Twofold identification technique (Random Forest + Edit Distance) | [24] | Flow-level network traffic and knowledge of servers run by the manufacturers | — | [25] | Periodic communication traffic features | KNN | [26] | Features from DNS queries and HTTP URI’s | Improved k-means algorithm, Random Forest, SDN | [27] | Statistical attributes such as activity cycles, port numbers, signaling patterns, and cipher suites | A multistage machine learning (Naive Bayes + Random Forest) | [28] | 18 features of DHCP | Dirichlet process | [29] | Features from passively received broadcast and multicast packets | Multiview wide and deep learning framework | [30] | Features in TCP header per TCP flow | PCA, Random Forest | [4] | Raw network traffic from devices | CNN, BiLSTM | [31] | Banners, honeypots | Active scanning | [34–36] | Banners | Active scanning, match | [37] | Banners | Active scanning, search and match |
|
|