Trey Reece;Supreeth Sathyanarayana;William H. Robinson;Raheem A. Beyah
{"title":"从外部看内部:利用网络流量分析检测假冒设备","authors":"Trey Reece;Supreeth Sathyanarayana;William H. Robinson;Raheem A. Beyah","doi":"10.1109/TMSCS.2016.2631534","DOIUrl":null,"url":null,"abstract":"In order to combat the growing threat of counterfeit components, this paper describes a technique to fingerprint and identify components based upon the way in which they send and process ICMP, UDP, and TCP network packets. These network fingerprints are then processed by an artificial neural network in order to categorize and classify individual processors. These tests found that ICMP and UDP packets provided an an effective, inexpensive, and fast tool for identifying counterfeit components in a network.","PeriodicalId":100643,"journal":{"name":"IEEE Transactions on Multi-Scale Computing Systems","volume":"3 1","pages":"50-61"},"PeriodicalIF":0.0000,"publicationDate":"2016-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1109/TMSCS.2016.2631534","citationCount":"0","resultStr":"{\"title\":\"On The Outside Looking In: Towards Detecting Counterfeit Devices Using Network Traffic Analysis\",\"authors\":\"Trey Reece;Supreeth Sathyanarayana;William H. Robinson;Raheem A. Beyah\",\"doi\":\"10.1109/TMSCS.2016.2631534\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In order to combat the growing threat of counterfeit components, this paper describes a technique to fingerprint and identify components based upon the way in which they send and process ICMP, UDP, and TCP network packets. These network fingerprints are then processed by an artificial neural network in order to categorize and classify individual processors. These tests found that ICMP and UDP packets provided an an effective, inexpensive, and fast tool for identifying counterfeit components in a network.\",\"PeriodicalId\":100643,\"journal\":{\"name\":\"IEEE Transactions on Multi-Scale Computing Systems\",\"volume\":\"3 1\",\"pages\":\"50-61\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-11-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://sci-hub-pdf.com/10.1109/TMSCS.2016.2631534\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Transactions on Multi-Scale Computing Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/7752950/\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Multi-Scale Computing Systems","FirstCategoryId":"1085","ListUrlMain":"https://ieeexplore.ieee.org/document/7752950/","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
On The Outside Looking In: Towards Detecting Counterfeit Devices Using Network Traffic Analysis
In order to combat the growing threat of counterfeit components, this paper describes a technique to fingerprint and identify components based upon the way in which they send and process ICMP, UDP, and TCP network packets. These network fingerprints are then processed by an artificial neural network in order to categorize and classify individual processors. These tests found that ICMP and UDP packets provided an an effective, inexpensive, and fast tool for identifying counterfeit components in a network.