
model’s 0.709. Using source domain information
without adjusting it for the target domain results in
unfocused optimizations. Transfer learning helps but
is less efficient than hybrid TL.
Non-TL methods took the longest to train and test.
The CIC-UNB training processing time was 1.321
seconds, longer than the TL approaches. Inefficient
results result from training the model from scratch
without source domain knowledge. Thus, this strat-
egy is computationally intensive and impractical for
limited resources and time.
The datasets also affected the calculation times.
Due to its simpler data patterns. UNSW had the
longest timings, suggesting a greater complexity and
scale of this dataset, whereas IoT Sentinel took a little
longer, reflecting reasonably complicated data.
The hybrid-based TL showed the best efficiency-
computational cost ratio. Although slower than
instance-based and feature-based approaches, it was
more accurate and efficient than the Source-only and
non-TL methods. These results indicate that hybrid
TL is the best scalable and efficient model for com-
plex datasets.
Table 13: Training and Testing Time for Different Ap-
proaches on All Datasets.
Dataset Approach
Training Time Testing Time
(sec) (sec)
CIC-UNB
Instance-based TL 0.412 0.021
Feature-based TL 0.398 0.019
Hybrid TL 0.489 0.024
Source-only TL 0.511 0.025
Without TL (Opoku et al., 2024) 1.321 0.017
IoT Sentinel
Instance-based TL 0.532 0.023
Feature-based TL 0.498 0.020
Hybrid TL 0.611 0.029
Source-only TL 0.621 0.030
Without TL (Opoku et al., 2024) 1.378 0.402
UNSW
Instance-based TL 0.623 0.030
Feature-based TL 0.588 0.028
Hybrid TL 0.709 0.035
Source-only TL 0.712 0.037
Without TL (Opoku et al., 2024) 1.715 0.520
7 CONCLUSION
We introduced a reliable and practical framework for
the identification of IoT devices through the analy-
sis of network traffic, using a carefully selected set
of characteristics in conjunction with ML and TL
techniques. Our methodology considered four TL
approaches, each using a different feature engineer-
ing procedure. These approaches were compared to
a baseline method without TL. We ensured that the
proposed approaches met rigorous model evaluation
standards using well-known metrics, that is, preci-
sion, accuracy, recall, and F1-Score.
In all datasets considered, the hybrid-based TL ap-
proach outperformed alternative TL models as well as
the baseline model. The time performance improved
significantly using the hybrid approach, making it
scalable and efficient for real-world applications.
REFERENCES
Aidoo, A., Schiller, E., and Fuhrer, J. (2022). Landscape
of iot security. Journal of Computer Science Review,
25(3):100–120.
Aksoy, A. and Gunes, M. H. (2019). Automated iot de-
vice identification using network traffic. In ICC 2019
- 2019 IEEE International Conference on Communi-
cations (ICC), pages 1–7.
Anowar, F., Sadaoui, S., and Selim, B. (2021). Conceptual
and empirical comparison of dimensionality reduction
algorithms (pca, kpca, lda, mds, svd, lle, isomap, le,
ica, t-sne). Computer Science Review, 40:100378.
Breiman, L. (2001). Random forests. Machine Learning,
45(1):5–32.
Brownlee, J. (2024). Why one-hot encode data in machine
learning? - machinelearningmastery.com. Accessed:
Nov. 27, 2024.
Dadkhah, S., Mahdikhani, H., Danso, P. K., Zohourian, A.,
Truong, K. A., and Ghorbani, A. A. (2022). Towards
the development of a realistic multidimensional iot
profiling dataset. In The 19th Annual International
Conference on Privacy, Security & Trust (PST2022),
Fredericton, Canada.
Dwivedi, Y. K., Hughes, L., Baabdullah, A. M., Ribeiro-
Navarrete, S., Giannakis, M., and Al-Debei (2022).
Metaverse beyond the hype: Multidisciplinary per-
spectives on emerging challenges, opportunities, and
agenda for research, practice and policy. International
Journal of Information Management, 66:102542.
Falola, O., Louafi, H., and Mouhoub, M. (2023). Optimiz-
ing iot device fingerprinting using machine learning.
In Innovations in Digital Forensics, chapter 9, pages
293–317. World Scientific.
Fan, F. L.-N., Li, C.-L., Wu, Y.-C., Duan, C.-X., Wang, Z.-
L., Lin, H., and Yang, J.-H. (2024). Survey on iot
device identification and anomaly detection. Journal
of Software, 35(1):288.
Gholami, M., Mouhoub, M., and Sadaoui, S. (2023). Fea-
ture selection using evolutionary techniques. In 2023
IEEE International Conference on Systems, Man, and
Cybernetics (SMC), pages 1162–1167.
Hamad, S. A., Zhang, W. E., Sheng, Q. Z., and Nepal,
S. (2019). Iot device identification via network-flow
based fingerprinting and learning. In 2019 18th IEEE
International Conference On Trust, Security And Pri-
vacy In Computing And Communications/13th IEEE
International Conference On Big Data Science And
Engineering (TrustCom/BigDataSE).
Kawish, S., Louafi, H., and Yao, Y. (2023). An instance-
based transfer learning approach, applied to intrusion
detection. In 2023 IEEE International Conference on
Privacy, Security, Trust, pages 1–7.
Kumar, V. and Minz, S. (2014). Feature selection. SmartCR,
4(3):211–229.
A Hybrid-Based Transfer Learning Approach for IoT Device Identification
319