Toward a Better Understanding of IoT Domain Names: A Study of IoT Backend

Uložené v:
Podrobná bibliografia
Názov: Toward a Better Understanding of IoT Domain Names: A Study of IoT Backend
Autori: Ayoub, Ibrahim, S. Lenders, Martine, Ampeau, Benoît, Balakrichenan, Sandoche, Khawam, Kinda, C. Schmidt, Thomas, Wählisch, Matthias
Prispievatelia: HAL UVSQ, Équipe
Zdroj: IEEE Access, Vol 13, Pp 68871-68890 (2025)
Informácie o vydavateľovi: Institute of Electrical and Electronics Engineers (IEEE), 2025.
Rok vydania: 2025
Predmety: IoT, servers, machine learning, Internet of Things, Machine learning, security, Electrical engineering. Electronics. Nuclear engineering, Domain names, [SHS.GESTION] Humanities and Social Sciences/Business administration, Domain Name System, Protocols, Accuracy, TK1-9971
Popis: In this paper, we study Internet of Things (IoT) domain names, the domain names of backend servers on the Internet that are accessed by IoT devices. We investigate how they compare to non-IoT domain names based on their statistical and DNS properties and the feasibility of classifying these two classes of domain names using machine learning (ML). We construct a dataset of IoT domain names by surveying past studies that used testbeds with real IoT devices. For the non-IoT dataset, we use two lists of top-visited websites. We study the statistical and DNS properties of the domain names. We also leverage machine learning and train six models to perform the classification between the two classes of domain names. The word embedding technique we use to get the real-valued vector representation of the domain names is Word2vec. Our statistical analysis highlights significant differences in domain name length, label frequency, and compliance with typical domain name construction guidelines, while our DNS analysis reveals notable variations in resource record availability and configuration between IoT and non-IoT DNS zones. As for classifying IoT and non-IoT domain names using machine learning, Random Forest achieves the highest performance among the models we train, yielding the highest accuracy, precision, recall, and $F_{1}$ score. Our work offers novel insights to IoT, potentially informing protocol design and aiding in network security and performance monitoring.
Druh dokumentu: Article
Popis súboru: application/pdf
ISSN: 2169-3536
DOI: 10.1109/access.2025.3561521
Prístupová URL adresa: https://doaj.org/article/09fd0290c93d4139b50fec265ff7732c
https://hal.science/hal-05059780v1/document
https://hal.science/hal-05059780v1
https://doi.org/10.1109/access.2025.3561521
Rights: CC BY
Prístupové číslo: edsair.doi.dedup.....7a51fa7e2389fc8fca376b84b63b3ee8
Databáza: OpenAIRE
Popis
Abstrakt:In this paper, we study Internet of Things (IoT) domain names, the domain names of backend servers on the Internet that are accessed by IoT devices. We investigate how they compare to non-IoT domain names based on their statistical and DNS properties and the feasibility of classifying these two classes of domain names using machine learning (ML). We construct a dataset of IoT domain names by surveying past studies that used testbeds with real IoT devices. For the non-IoT dataset, we use two lists of top-visited websites. We study the statistical and DNS properties of the domain names. We also leverage machine learning and train six models to perform the classification between the two classes of domain names. The word embedding technique we use to get the real-valued vector representation of the domain names is Word2vec. Our statistical analysis highlights significant differences in domain name length, label frequency, and compliance with typical domain name construction guidelines, while our DNS analysis reveals notable variations in resource record availability and configuration between IoT and non-IoT DNS zones. As for classifying IoT and non-IoT domain names using machine learning, Random Forest achieves the highest performance among the models we train, yielding the highest accuracy, precision, recall, and $F_{1}$ score. Our work offers novel insights to IoT, potentially informing protocol design and aiding in network security and performance monitoring.
ISSN:21693536
DOI:10.1109/access.2025.3561521