Abstract
In recent decades, security threats have posed a high risk to an organization, which is associated with the proliferation of IoT devices and increasing organizational assets. This ensures that the organization is unaware of the IoT devices' connection to their own network. In such cases, the security and integrity of the network might pose a serious security threat to the network communications. In this paper, the capsule network, which is an improved version of the convolutional neural network (CNN), is used to monitor the network traffic to identify accurately the trusted devices connected to the home network. The inadequacy of CNN in identifying IoT devices during their communication on the network has made the present research choose Capsule Networks (CapsNet) for device identification. The Capsule network carries out the operation in an iterative manner in order to attain improved classification of IoT devices. The activation function used in the capsule network is a squash function that normalizes the magnitude of the vector rather than the conventional use of scalar elements. The outputs of the activation function help to find trusted IoT devices through different capsules, which are formally trained using various concepts. The capsule network performs the identification of IoT devices and classifies trusted and non-trusted devices based on the labeled network traffic data. The simulation is performed by the computation of collected labeled network data from the IoT associated network.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Miorandi, D., Sicari, S., De Pellegrini, F., & Chlamtac, I. (2012). Internet of things: Vision, applications and research challenges. Ad hoc Networks, 10(7), 1497–1516.
Singhal, A., & Ou, X. (2017). Security risk analysis of enterprise networks using probabilistic attack graphs. In Network security metrics (pp. 53–73). Springer, Cham.
Tripathi, D., Ramachandra Reddy, B., Padmanabha Reddy, Y. C. A., Shukla, A. K., Kumar, R. K., & Sharma, N. K. BAT algorithm based feature selection: Application in credit scoring. Journal of Intelligent & Fuzzy Systems, (Preprint), 1–10.
Lakhina, A., Crovella, M., &Diot, C. (2005). Mining anomalies using traffic feature distributions. In ACM SIGCOMM computer communication review (Vol. 35, No. 4, pp. 217–228). ACM.
Lakhina, A., Papagiannaki, K., Crovella, M., Diot, C., Kolaczyk, E. D., & Taft, N. (2004). Structural analysis of network traffic flows. In ACM SIGMETRICS performance evaluation review (Vol. 32, No. 1, pp. 61–72). ACM.
Iglesias, F., & Zseby, T. (2015). Analysis of network traffic features for anomaly detection. Machine Learning, 101(1–3), 59–84.
Afshar, P., Mohammadi, A., & Plataniotis, K. N. (2018). Brain tumor type classification via capsule networks. In 2018 25th IEEE international conference on image processing (ICIP) (pp. 3129–3133). IEEE.
Zhao, W., Ye, J., Yang, M., Lei, Z., Zhang, S., & Zhao, Z. (2018). Investigating capsule networks with dynamic routing for text classification. arXiv preprint arXiv:1804.00538.
Shahroudnejad, A., Afshar, P., Plataniotis, K. N., & Mohammadi, A. (2018). Improved explainability of capsule networks: Relevance path by agreement. In 2018 IEEE global conference on signal and information processing (GlobalSIP) (pp. 549–553). IEEE.
Sabour, S., Frosst, N., & Hinton, G. E. (2017). Dynamic routing between capsules. In Advances in neural information processing systems (pp. 3856–3866).
Meidan, Y., Bohadana, M., Shabtai, A., Guarnizo, J. D., Ochoa, M., Tippenhauer, N. O., & Elovici, Y. (2017). ProfilIoT: a machine learning approach for IoT device identification based on network traffic analysis. In Proceedings of the symposium on applied computing (pp. 506–509). ACM.
Bhuyan, M. H., Bhattacharyya, D. K., & Kalita, J. K. (2016). A multi-step outlier-based anomaly detection approach to network-wide traffic. Information Sciences, 348, 243–271.
Sudharson, D., & Prabha, D. (2019). A novel machine learning approach for software reliability growth modelling with Pareto distribution function. Springer.
Azhaguramyaa, V. R., Srinivasan, K., Rajasekar, P., Lokeshwaran, A., & Manoj Kumar, T. L. (2018). A study of specimen classification of an image using machine learning. Journal of Advanced Research in Dynamical and Control Systems, 10(12), 1037–1039.
Pushpalatha, A. (2018). Survey on swarm optimization algorithms. Journal of Advanced Research in Dynamical and Control Systems, 12(special issue), 1117–1120.
Yang, X. S. (2010). A new metaheuristic bat-inspired algorithm. In Nature inspired cooperative strategies for optimization (NICSO 2010) (pp. 65–74). Springer
Yang, X. S., & HosseinGandomi, A. (2012). Bat algorithm: A novel approach for global engineering optimization. Engineering Computations, 29(5), 464–483.
Yang, X.-S., & He, X. (2013). Bat algorithm: Literature review and applications. International Journal of Bio-Inspired Computation, 5(3), 141–149.
Fister, I., Jr., et al. (2015). Particle swarm optimization for automatic creation of complex graphic characters. Chaos, Solitons and Fractals, 73, 29–35.
Yang, X.-S. (2011). Bat algorithm for multi-objective optimisation. International Journal of Bio-Inspired Computation, 3(5), 267–274.
Yao, H., Gao, P., Wang, J., Zhang, P., Jiang, C., & Han, Z. (2019). Capsule network assisted IoT traffic classification mechanism for smart cities. IEEE Internet of Things Journal, 6(5), 7515–7525.
Dwivedi, S., Vardhan, M., Tripathi, S., & Shukla, A. K. (2020). Implementation of adaptive scheme in evolutionary technique for anomaly-based intrusion detection. Evolutionary Intelligence, 13(1), 103–117.
Dwivedi, S., Vardhan, M., & Tripathi, S. (2020). Defense against distributed DoS attack detection by using intelligent evolutionary algorithm. International Journal of Computers and Applications, 1–11.
Shukla, A. K. (2020). An efficient hybrid evolutionary approach for identification of zero-day attacks on wired/wireless network system. Wireless Personal Communications, 1–29.
Dwivedi, S., Vardhan, M., & Tripathi, S. (2021). Building an efficient intrusion detection system using grasshopper optimization algorithm for anomaly detection. Cluster Computing, 1–20.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Azath, H., Devi Mani, M., Prasanna Venkatesan, G.K.D. et al. Identification of IoT Device From Network Traffic Using Artificial Intelligence Based Capsule Networks. Wireless Pers Commun 123, 2227–2243 (2022). https://doi.org/10.1007/s11277-021-09236-y
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-021-09236-y