Behavioral Fingerprinting of IoT Devices for Forensic Identification Post-Attack

Research output: Contribution to journalArticlepeer-review

Abstract

The rapid adoption of Internet of Things (IoT) devices has amplified security risks, particularly in post-incident scenarios where accurate device attribution and evidence reconstruction are required. Existing intrusion detection solutions mainly focus on real-time detection and provide limited forensic support after an attack. This paper proposes a phase-aware behavioral fingerprinting framework for post-attack forensic analysis of IoT devices. The approach models normal device behavior and compares it with post-incident activity to identify persistent behavioral deviations caused by compromise. A layered learning strategy is employed, combining supervised detection and attribution with unsupervised anomaly identification to capture residual and previously unseen behaviors. Temporal segmentation into pre-attack, attack, and post-attack phases enables reliable forensic timeline reconstruction and realistic evaluation. Experiments on a real-world IoT traffic dataset demonstrate high detection accuracy, strong generalization to unseen devices, and effective identification of post-attack residual behavior. The framework produces time-aligned forensic evidence that enables reconstruction of attack progression and post-attack behavior.

Original languageEnglish
Pages (from-to)5541-5552
Number of pages12
JournalIEEE Access
Volume14
DOIs
Publication statusPublished - 2026

Keywords

  • Accuracy
  • Authentication
  • Behavioral fingerprinting
  • Device compromise
  • Edge computing
  • Fingerprint recognition
  • Forensics
  • Internet of Things
  • Internet of Things (IoT)
  • Intrusion detection
  • Object recognition
  • Real-time systems
  • Security
  • Surveys

Fingerprint

Dive into the research topics of 'Behavioral Fingerprinting of IoT Devices for Forensic Identification Post-Attack'. Together they form a unique fingerprint.

Cite this