Xiao Hu’s research while affiliated with Chinese Academy of Sciences and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (1)


A Robust IoT Device Identification Method with Unknown Traffic Detection
  • Chapter

September 2021

·

59 Reads

·

2 Citations

Lecture Notes in Computer Science

Xiao Hu

·

·

·

[...]

·

Internet of Things (IoT) device identification plays a basic and essential role in network management and cyberspace security. Previous device identification methods perform poorly in real-world networks where much unknown traffic exists, since they only focus on improving performance on closed datasets and rely on manual features that are difficult to generalize. To achieve robust IoT device identification, we propose a new approach with unknown traffic detection, which consists of general training and novel inference stage. In the first stage, a simple neural network is trained to extract spatial-temporal features automatically and explicitly form tight clusters of known devices through multi-task learning. Furthermore, we use extreme value theory (EVT) to model the boundary of each cluster in the feature space. Then the probability of unknown traffic is recalibrated in the inference stage. Experiments on a public IoT traffic dataset show that the accuracy and f1 score of our method are both over 92%, which significantly outperforms all compared methods under diverse experimental settings. In addition, the visualization of intermediate results illustrates the interpretability of our method.

Citations (1)


... In recent years, deep learning has been employed to solve increasingly serious network security problems, especially passive IoT device identification [5,9,14,[23][24][25][26]29], which has shown unlimited potential and achieved remarkable success. However, once the device identification model that performs well in the laboratory is deployed in a real open environment, it will fall into the dilemma of performance degradation [28]. ...

Reference:

An Evolutionary Learning Approach Towards the Open Challenge of IoT Device Identification
A Robust IoT Device Identification Method with Unknown Traffic Detection
  • Citing Chapter
  • September 2021

Lecture Notes in Computer Science