Device Fingerprinting for Access Control over a Campus and Isolated Network

Primary tabs

Citation Author(s):
Nagender
Aneja
Universiti Brunei Darussalam
Sandhya
Aneja
Universiti Brunei Darussalam
Md Shohidul
Islam
Universiti Brunei Darussalam
Bharat
Bhargava
Purdue University
Submitted by:
Nagender Aneja
Last updated:
Wed, 07/22/2020 - 04:53
DOI:
10.21227/d9e4-wm90
Data Format:
License:
Creative Commons Attribution
141 Views
Categories:
Keywords:
0
0 ratings - Please login to submit your rating.

Abstract 

Device Fingerprinting for Access Control over a Campus and Isolated Network Device Fingerprinting (DFP) is a technique to identify devices using Inter-Arrival Time (IAT) of packets and without using any other unique identifier. Our experiments include generating graphs of IATs of 100 packets and using Convolutional Neural Network on the generated graphs to identify a device. We did two experiments where the first experiment was on Raspberri Pi and other experiment was on crawdad dataset. First Experiment: Raspberry Pi We developed a packet sniffer application to capture IAT of packets. Packet sniffer application was installed on Raspberry pi that was configured to work as router. We connceted two devices iPad4 and iPhone 7 Plus to the router and created IAT graphs for these two devices. Our scheme based on Convolution Neural Network (CNN) was able to identify the devices with accuracy of 86.7%. Second Experiment: Crawdad Dataset In the second experiment, we tested the scheme with Crawdad dataset. The proposed scheme achieved accuracy of 95.5% for GTID that is 3% higher than previous scheme for 14 devices and 5 device types on isolated network while 40% efficient in time to test a device fingerprint.

Instructions: 

All instructions are available at https://github.com/naneja/device-fingerprinting 

Comments

Updated dataset

Submitted by Nagender Aneja on Wed, 07/22/2020 - 04:54