Fingerprinting Industrial IoT devices based on multi-branch neural network

被引:7
作者
Yang, Kai [1 ]
Li, Qiang [2 ]
Wang, Haining [3 ]
Sun, Limin [4 ]
Liu, Jiqiang [2 ]
机构
[1] Guangxi Univ, Sch Comp Elect & Informat, Nanning, Peoples R China
[2] Beijing Jiaotong Univ, Sch Comp & Informat Technol, Beijing, Peoples R China
[3] Virginia Tech, Dept Elect & Comp Engn, Blacksburg, VA USA
[4] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
关键词
Industrial Internet-of-Things; Fingerprinting; Attack detection; Neural network; TRAFFIC CLASSIFICATION; PHYSICAL DEVICE; IDENTIFICATION;
D O I
10.1016/j.eswa.2023.122371
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Industrial Internet-of-Things systems suffer from a vast and vulnerable attack surface, raising widespread concerns about shielding IIoT devices from malicious attacks and reducing cyber risks. Device identification is the prerequisite to safeguard IIoT systems. We leverage the observation that IIoT network protocol implementations vary due to different hardware architectures/configurations and design tasks of IIoT devices, which cause the difference in their network traffic payloads. Specifically, we develop a novel neural network to learn the semantic/syntax features among multiple IIoT packets. The neural network has multiple branches, each of which consists of convolution layers, attention modules, and highway units for learning the classification model of IIoT devices. To validate the precision and recall of our neural network in IIoT devices fingerprinting, we have implemented a prototype of the proposed IIoT device identification system. Our results show that our approach achieves 95.8% precision and 95.4% recall, significantly outperforming other classification models.
引用
收藏
页数:12
相关论文
共 58 条
[1]  
Al Ghazo AT, 2019, 2019 IFIP/IEEE SYMPOSIUM ON INTEGRATED NETWORK AND SERVICE MANAGEMENT (IM)
[2]   Adaptive Encrypted Traffic Fingerprinting With Si-Directional Dependence [J].
Al-Naami, Khaled ;
Chandra, Swarup ;
Mustafa, Ahmad ;
Khan, Latifur ;
Lin, Zhiqiang ;
Hamlen, Kevin ;
Thuraisingham, Bhavani .
32ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2016), 2016, :177-188
[3]   TLS Beyond the Browser: Combining End Host and Network Data to Understand Application Behavior [J].
Anderson, Blake ;
McGrew, David .
IMC'19: PROCEEDINGS OF THE 2019 ACM INTERNET MEASUREMENT CONFERENCE, 2019, :379-392
[4]  
[Anonymous], IEC Industrial Communication Networks
[5]  
Antonakakis M, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P1093
[6]  
Automation I, 2018, Market Share Of Different PLCs
[7]  
Biham E., 2019, Rogue7: Rogue Engineering-Station attacks on S7 Simatic PLCs
[8]  
Biondi Philippe., 2015, Scapy
[9]   A secure and efficient data sharing scheme based on blockchain in industrial Internet of Things [J].
Chi, Jiancheng ;
Li, Yu ;
Huang, Jing ;
Liu, Jing ;
Jin, Yingwei ;
Chen, Chen ;
Qiu, Tie .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 167 (167)
[10]  
Cho KT, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P911