Exploring the power of convolutional neural networks for encrypted industrial protocols recognition

被引:2
作者
Holasova, Eva [1 ]
Blazek, Petr [1 ]
Fujdiak, Radek [1 ]
Masek, Jan [1 ]
Misurec, Jiri [1 ]
机构
[1] Brno Univ Technol, Fac Elect Engn & Commun, Dept Telecommun, Technicka 12, Brno 616 00, Czech Republic
关键词
Convolutional neural network; Encrypted traffic; Industrial protocols; Operational technology; Protocol recognition; Virtual private network; TRAFFIC CLASSIFICATION; ANOMALY DETECTION;
D O I
10.1016/j.segan.2023.101269
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
The main objective of this paper is to classify unencrypted and encrypted industrial protocols using deep learning, especially Convolutional Neural Networks. Protocol recognition is important for network security and network analysis. Overall knowledge of industrial protocols and networks is crucial, especially in operational technologies. Five industrial protocol standards are under investigation, namely IEC 60870-5-104, IEC 61850 (MMS, GOOSE, SV) and Modbus/TCP. It is also investigated whether the selected protocols can be recognized in their encrypted version. Furthermore, it is investigated whether this encrypted traffic is recognizable from the use of VPN technology. Three convolutional neural network models were trained to recognize industrial protocols. These networks outperform traditional machine learning in pattern recognition in several areas of classification. By converting the captured traffic into image data that convolutional neural networks work with, differences in the encrypted traffic of different industrial protocols can be recognized. Three scenarios (1D, 2D, PKT) are presented using convolutional neural network models with 1D and 2D architectures. Training, testing and validation data are used to verify each scenario. An accuracy of 96-97% is achieved for the recognition of unencrypted and encrypted industrial protocols. According to the results, 2D convolutional neural network model is faster than 1D and PKT models. The 1D and 2D models are suitable for use in protocol specific networks. Another application of these models can be anomaly detection in these networks. The PKT model is useful in networks with multiple industry protocols because it can evaluate network traffic on a packet-by-packet basis.
引用
收藏
页数:11
相关论文
共 65 条
  • [1] Applying Non-Nested Generalized Exemplars Classification for Cyber-Power Event and Intrusion Detection
    Adhikari, Uttam
    Morris, Thomas H.
    Pan, Shengyi
    [J]. IEEE TRANSACTIONS ON SMART GRID, 2018, 9 (05) : 3928 - 3941
  • [2] New Approach to Determine DDoS Attack Patterns on SCADA System Using Machine Learning
    Alhaidari, Fahd A.
    Al-Dahasi, Ezaz Mohammed
    [J]. 2019 INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCES (ICCIS), 2019, : 541 - 546
  • [3] [Anonymous], 2005, Overview of DNP3 Protocol
  • [4] [Anonymous], 1996, Modicon Modbus Protocol Reference Guide
  • [5] [Anonymous], 2014, C4. 5: Programs for Machine Learning
  • [6] [Anonymous], 2006, International Standard IEC 60870-5-104
  • [7] Arifin MAS, 2021, 2021 8TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING, COMPUTERSCIENCE AND INFORMATICS (EECSI) 2021, P228, DOI 10.23919/EECSI53397.2021.9624255
  • [8] Chakraborty I., 2021, Array, V12
  • [9] Review of Security Issues in Industrial Networks
    Cheminod, Manuel
    Durante, Luca
    Valenzano, Adriano
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2013, 9 (01) : 277 - 293
  • [10] A Network Traffic Classification Model Based on Metric Learning
    Chen, Mo
    Wang, Xiaojuan
    He, Mingshu
    Jin, Lei
    Javeed, Khalid
    Wang, Xiaojun
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2020, 64 (02): : 941 - 959