Repository logo

Deep learning for IoT fingerprinting

dc.contributor.authorBar-on, Maxwel A., author
dc.contributor.authorRay, Indrakshi, advisor
dc.contributor.authorBezawada, Bruhadeshwar, committee member
dc.contributor.authorRay, Indrajit, committee member
dc.contributor.authorJayasumana, Anura, committee member
dc.date.accessioned2026-01-12T11:27:40Z
dc.date.issued2025
dc.descriptionZip file contains thesis presentation.
dc.description.abstractThe rapid growth of the Internet-of-Things (IoT) industry has introduced new attack surfaces in home and enterprise networks due to insufficient built-in security measures in many IoT devices. IoT network fingerprinting, the process of identifying IoT devices from their network communication patterns, can be used to select appropriate access controls for vulnerable IoT devices, offering a promising solution to this security problem. Typical state-of-the-art IoT fingerprinting approaches identify devices by applying deep learning models to samples of their network traffic. This work addresses 5 challenges of using deep learning for IoT fingerprinting: (1) traffic collected by a single observer may be insufficient for training an accurate fingerprinting model; (2) variations in communication rates among different IoT devices results in imbalanced datasets, which can lead to biased models; (3) it is difficult for a model to capture the relationships between packets when some packets belong to separate flows; (4) it is inefficient to adapt an existing IoT fingerprinting model to identify new devices; and (5) relying on fixed-length samples of traffic can result in arbitrarily long fingerprinting times. For the first challenge, we propose a federated learning approach for training a fingerprinting model using traffic collected by multiple separate observers. For the second challenge, we propose a hierarchical Mixture-of-Experts that balances training data by grouping devices based on their communication rates before identifying them. For the third challenge, we propose a relative encoding technique for packet endpoints that preserves relationships across flows. For the fourth challenge, we propose a bi-component fingerprinting architecture that efficiently adapts to new devices by reusing a portion of its parameters. Finally, for the fifth challenge, we propose a fixed-time traffic sampling approach. We evaluate our proposed approaches through a series of experiments and demonstrate how each one overcomes its associated challenge in an experimental setting.
dc.format.mediumborn digital
dc.format.mediummasters theses
dc.format.mediumZIP
dc.format.mediumPDF
dc.identifierBaron_colostate_0053N_19301.pdf
dc.identifier.urihttps://hdl.handle.net/10217/242675
dc.identifier.urihttps://doi.org/10.25675/3.025567
dc.languageEnglish
dc.language.isoeng
dc.publisherColorado State University. Libraries
dc.relation.ispartof2020-
dc.rightsCopyright and other restrictions may apply. User is responsible for compliance with all applicable laws. For information about copyright law, please see https://libguides.colostate.edu/copyright.
dc.subjectfederated learning
dc.subjectInternet of Things
dc.subjecttransfer learning
dc.subjectfingerprinting
dc.subjectdeep learning
dc.subjectnetwork security
dc.titleDeep learning for IoT fingerprinting
dc.typeText
dc.typeImage
dcterms.rights.dplaThis Item is protected by copyright and/or related rights (https://rightsstatements.org/vocab/InC/1.0/). You are free to use this Item in any way that is permitted by the copyright and related rights legislation that applies to your use. For other uses you need to obtain permission from the rights-holder(s).
thesis.degree.disciplineComputer Science
thesis.degree.grantorColorado State University
thesis.degree.levelMasters
thesis.degree.nameMaster of Science (M.S.)

Files

Original bundle

Now showing 1 - 2 of 2
Loading...
Thumbnail Image
Name:
Baron_colostate_0053N_19301.pdf
Size:
1.27 MB
Format:
Adobe Portable Document Format
Loading...
Thumbnail Image
Name:
supplemental.zip
Size:
1.21 MB
Format:
Zip File