Internet of Things (IoT) devices are becoming more widespread in networks and are shown to have security considerations as an afterthought. Identifying IoT devices can help users locate security ...vulnerabilities in their networks. Previous studies have used machine learning and rule-based methods to try and identify unknown devices from passive network traffic. The first issue with these approaches however is that the device must have been seen on a training dataset beforehand; otherwise it cannot be identified. The second issue is that trying to achieve granularity on device identification down to firmware level from passive network traffic has not been researched before, and is a key factor in identifying vulnerable devices. This paper contains a novel technique to solve those two problems. The technique automatically identifies unknown devices from passive network traffic without using a machine learning approach that finds and weights keywords found in each packet per device. These keywords then allow device identification down to a specific firmware version. The approach in this paper achieved 71% accuracy for identifying firmware versions and 74% and 78% for models and makes respectively, across a test dataset of 44 devices.
Afterword ASHLEY ANDREWS LEAR
The Remarkable Kinship of Marjorie Kinnan Rawlings and Ellen Glasgow,
06/2018
Book Chapter
In her groundbreaking In Search of Our Mothers’ Gardens, Alice Walker wrote, “I became aware of my need of Zora Neale Hurston’s work some time before I knew her work existed” (Walker 83). The more ...she read, the more Walker appreciated that a great woman had come before her to do the work she longed to do. The downside to this realization came when she tried to read criticism on Hurston and found it to be derisive and inaccurate. Walker described her disheartened reaction: “For if a woman who had given so much of obvious value to all of us