Connect Id: Identifying Devices before They Connect to the Network

Rishabh Singla, A. L. Narasimha Reddy, Riccardo Bettati, Hussein Alnuweiri

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Increasingly, network smart devices are being deployed and operated over the network. The Mirai attack has shown that the vulnerabilities of these devices can be exploited to stage large-scale attacks. In this paper, we explore the potential for identifying a device before it connects to the network such that appropriate security postures can be taken based on the known characteristics of the device. We propose to identify a device by (1) Device Vendor (2) Device Operating System (3) Device Type. We propose to utilize several pieces of information available before a device is allowed to connect to the network, such as MAC address and DHCP packet information, to classify the device. We propose a number of algorithms to utilize this information to robustly identify the device on these 3 dimensions. We show that it is possible to effectively identify a device before it is allowed access on the network and thus inform the security policies governing the network.

Original languageEnglish
Title of host publication7th IEEE World Forum on Internet of Things, WF-IoT 2021
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages421-426
Number of pages6
ISBN (Electronic)9781665444316
DOIs
Publication statusPublished - 14 Jun 2021
Externally publishedYes
Event7th IEEE World Forum on Internet of Things, WF-IoT 2021 - New Orleans, United States
Duration: 14 Jun 202131 Jul 2021

Publication series

Name7th IEEE World Forum on Internet of Things, WF-IoT 2021

Conference

Conference7th IEEE World Forum on Internet of Things, WF-IoT 2021
Country/TerritoryUnited States
CityNew Orleans
Period14/06/2131/07/21

Keywords

  • Device Identification
  • Measurement
  • Network Security

Fingerprint

Dive into the research topics of 'Connect Id: Identifying Devices before They Connect to the Network'. Together they form a unique fingerprint.

Cite this