Internet-wide scanner fingerprint identifier based on TCP/IP header

A Tanaka, C Han, T Takahashi… - 2021 Sixth International …, 2021 - ieeexplore.ieee.org
Identifying individual scan activities is a crucial and challenging activity for mitigating
emerging cyber threats or gaining insights into security scans. Sophisticated adversaries …

Detecting Coordinated Internet-Wide Scanning by TCP/IP Header Fingerprint

A Tanaka, C Han, T Takahashi - IEEE Access, 2023 - ieeexplore.ieee.org
Adversaries perform port scanning to discover accessible and vulnerable hosts as a prelude
to cyber havoc. A darknet is a cyberattack observation network to capture these scanning …

DSLN: Securing Internet of Things through RF fingerprint recognition in low-SNR settings

W Wu, S Hu, D Lin, Z Liu - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
The explosive growth of Internet of Things (IoT) has mandated the security of data access.
Although authentication methods can enhance network security, their vulnerability to …

Network traffic analysis based iot device identification

RR Chowdhury, S Aneja, N Aneja, E Abas - … on Big Data and Internet of …, 2020 - dl.acm.org
Device identification is the process of identifying a device on Internet without using its
assigned network or other credentials. The sharp rise of usage in Internet of Things (IoT) …

Using deep packet inspection in cybertraffic analysis

L Deri, F Fusco - 2021 IEEE International Conference on Cyber …, 2021 - ieeexplore.ieee.org
In recent years we have observed an escalation of cybersecurity attacks, which are
becoming more sophisticated and harder to detect as they use more advanced evasion …

Remote fingerprinting on internet-wide printers based on neural network

Z Yan, S Lv, Y Zhang, H Zhu… - 2019 IEEE Global …, 2019 - ieeexplore.ieee.org
Nowadays, a large number of printers are connecting to the Internet. It is undoubtedly true
that these online printers are facing severe cyber threats. However, the …

Detecting cryptojacking traffic based on network behavior features

X Hu, Z Shu, X Song, G Cheng… - 2021 IEEE Global …, 2021 - ieeexplore.ieee.org
Bitcoin and other digital cryptocurrencies have de-veloped rapidly in recent years. To reduce
hardware and power costs, many criminals use the botnet to infect other hosts to mine …

Spbiseq: An early-stage fingerprint generation method with high robustness for encrypted mobile application traffic

J Shi, C Yang, Q Yang, J Zhang, M Cui… - 2021 IEEE 4th …, 2021 - ieeexplore.ieee.org
Early-stage encrypted traffic classification refers to the identification of the application to
which the flow belongs within a limited number of transmission packets or bytes after the …

A method of Shadowsocks (R) traffic identification based on protocol analysis

J Luo, L Bao, L Ni - 2021 IEEE 21st International Conference on …, 2021 - ieeexplore.ieee.org
Shadowsocks (R) is a proxy software based on Socks5, which is the collective name of
Shadowsocks and Shadowsocks (R). In order to improves the shortcomings of other …

An IoT Device Identification Method Using Extracted Fingerprint From Sequence of Traffic Grayscale Images

Y Feng, Y Zhang, H He, W Zhang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
With the widespread deployment and application of various types of IoT devices, preventing
illegal intrusion and impersonation attacks of IoT devices has become an important security …