Abstract

Networked device identification technology is the basis for researchers to locate specific targets and collect intelligence. It is also necessary means to maintain the security of information infrastructure. Networked device identification can be used in many fields, such as threat perception and early warning, device authentication, anti-identification, and enterprise understanding of equipment asset distribution. It is of great significance to defend network attacks and maintain network security. However, there are few reviews on networked device identification. In this paper we divide the whole device identification technology into three parts: data processing analysis, device identification method, and device identification system evaluation. At the same time, the difficulties of current device identification technology are analyzed, and the future trend of device identification is prospected.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call