Passive Classification of Wi-Fi Enabled Devices

We propose a method for classifying Wi-Fi enabled mobile handheld devices (smartphones) and non-handheld devices (laptops) in a completely passive way, that is resorting neither to traffic probes on network edge devices nor to deep packet inspection techniques to read application layer information. Instead, classification is performed starting from probe requests Wi-Fi frames, which can be sniffed with inexpensive commercial hardware. We extract distinctive features from probe request frames (how many probe requests are transmitted by each device, how frequently, etc.) and take a machine learning approach, training four different classifiers to recognize the two types of devices. We compare the performance of the different classifiers and identify a solution based on a Random Decision Forest that correctly classify devices 95% of the times. The classification method is then used as a pre-processing stage to analyze network traffic traces from the wireless network of a university building, with interesting considerations on the way different types of devices uses the network (amount of data exchanged, duration of connections, etc.). The proposed methodology finds application in many scenarios related to Wi-Fi network management/optimization and Wi-Fi based services.

[1]  Nobuhiko Nishio,et al.  Statistical analysis of actual number of pedestrians for Wi-Fi packet-based pedestrian flow sensing , 2015, UbiComp/ISWC Adjunct.

[2]  Yuanyuan Zhang,et al.  A measurement study of a campus Wi-Fi network with mixed handheld and non-handheld traffic , 2015, 2015 IEEE 28th Canadian Conference on Electrical and Computer Engineering (CCECE).

[3]  Erich M. Nahum,et al.  Smartphones vs. laptops: comparing web browsing behavior and the implications for caching , 2012, SIGMETRICS '12.

[4]  A. B. M. Musa,et al.  Tracking unmodified smartphones using wi-fi monitors , 2012, SenSys '12.

[5]  Mathieu Cunche,et al.  I know your MAC address: targeted tracking of individual using Wi-Fi , 2014, Journal of Computer Virology and Hacking Techniques.

[6]  Mathieu Cunche,et al.  Device-to-identity linking attack using targeted wi-fi geolocation spoofing , 2015, WISEC.

[7]  Mathieu Cunche,et al.  Large Scale Wi-Fi tracking using a Botnet of Wireless Routers , 2015 .

[8]  Aditya Akella,et al.  A Comparative Study of Handheld and Non-handheld Traffic in Campus Wi-Fi Networks , 2011, PAM.

[9]  Erich M. Nahum,et al.  Configuring DHCP leases in the smartphone era , 2012, Internet Measurement Conference.

[10]  Anja Feldmann,et al.  A First Look at Mobile Hand-Held Device Traffic , 2010, PAM.

[11]  Ahmed Helmy,et al.  Comparing wireless network usage: laptop vs smart-phones , 2013, MobiCom.

[12]  Ahmed Helmy,et al.  Changing patterns of mobile network (WLAN) Usage: Smart-Phones vs. Laptops , 2013, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC).

[13]  Philipp Marcus,et al.  Estimating crowd densities and pedestrian flows using wi-fi and bluetooth , 2014, MobiQuitous.

[14]  Bing Wang,et al.  Network performance of smart mobile handhelds in a university campus WiFi network , 2012, Internet Measurement Conference.

[15]  Michalis Faloutsos,et al.  A behavior-aware profiling of handheld devices , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).

[16]  Yue Gao,et al.  EV-Linker: Mapping eavesdropped Wi-Fi packets to individuals via electronic and visual signal matching , 2016, J. Comput. Syst. Sci..