CPS device-class identification via behavioral fingerprinting: from theory to practice

L Babun, H Aksu, AS Uluagac - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Cyber-Physical Systems (CPS) utilize different devices to collect sensitive data,
communicate with other systems, and monitor essential processes in critical infrastructure …

A survey on device behavior fingerprinting: Data sources, techniques, application scenarios, and datasets

PMS Sánchez, JMJ Valero, AH Celdrán… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
In the current network-based computing world, where the number of interconnected devices
grows exponentially, their diversity, malfunctions, and cybersecurity threats are increasing at …

[HTML][HTML] A methodology to identify identical single-board computers based on hardware behavior fingerprinting

PMS Sánchez, JMJ Valero, AH Celdrán, G Bovet… - Journal of Network and …, 2023 - Elsevier
The connectivity and resource-constrained nature of single-board devices open the door to
cybersecurity concerns affecting Internet of Things (IoT) scenarios. One of the most important …

Behavioral fingerprinting of Internet‐of‐Things devices

B Bezawada, I Ray, I Ray - Wiley Interdisciplinary Reviews …, 2021 - Wiley Online Library
Rapid advances in the Internet‐of‐Things (IoT) domain have led to the development of
several useful and interesting devices that have enhanced the quality of home living and …

Device fingerprinting for cyber-physical systems: a survey

V Kumar, K Paul - ACM Computing Surveys, 2023 - dl.acm.org
The continued growth of the cyber-physical system (CPS) and Internet of Things
technologies raises device security and monitoring concerns. For device identification …

Behavioral fingerprinting of iot devices

B Bezawada, M Bachani, J Peterson, H Shirazi… - Proceedings of the …, 2018 - dl.acm.org
The Internet-of-Things (IoT) has brought in new challenges in device identification--what the
device is, and authentication--is the device the one it claims to be. Traditionally, the …

GTID: A Technique for Physical Device and Device Type Fingerprinting

SV Radhakrishnan, AS Uluagac… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
In this paper, we introduce GTID, a technique that can actively and passively fingerprint
wireless devices and their types using wire-side observations in a local network. GTID …

[PDF][PDF] Who's in Control of Your Control System? Device Fingerprinting for Cyber-Physical Systems.

D Formby, P Srinivasan, AM Leonard, JD Rogers… - NDSS, 2016 - ndss-symposium.org
Industrial control system (ICS) networks used in critical infrastructures such as the power
grid present a unique set of security challenges. The distributed networks are difficult to …

Machine learning fingerprinting methods in cyber security domain: Which one to use?

M Laštovička, A Dufka… - 2018 14th International …, 2018 - ieeexplore.ieee.org
Identification of a communicating device operating system is a fundamental part of network
situational awareness. However, current networks are large and change often which implies …

A passive technique for fingerprinting wireless devices with wired-side observations

AS Uluagac, SV Radhakrishnan… - … IEEE conference on …, 2013 - ieeexplore.ieee.org
In this paper, we introduce GTID, a technique that passively fingerprints wireless devices
and their types from the wired backbone. GTID exploits the heterogeneity of devices, which …