Exploring the power of convolutional neural networks for encrypted industrial protocols recognition

被引:3
作者
Holasova, Eva [1 ]
Blazek, Petr [1 ]
Fujdiak, Radek [1 ]
Masek, Jan [1 ]
Misurec, Jiri [1 ]
机构
[1] Brno Univ Technol, Fac Elect Engn & Commun, Dept Telecommun, Technicka 12, Brno 616 00, Czech Republic
关键词
Convolutional neural network; Encrypted traffic; Industrial protocols; Operational technology; Protocol recognition; Virtual private network; TRAFFIC CLASSIFICATION; ANOMALY DETECTION;
D O I
10.1016/j.segan.2023.101269
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
The main objective of this paper is to classify unencrypted and encrypted industrial protocols using deep learning, especially Convolutional Neural Networks. Protocol recognition is important for network security and network analysis. Overall knowledge of industrial protocols and networks is crucial, especially in operational technologies. Five industrial protocol standards are under investigation, namely IEC 60870-5-104, IEC 61850 (MMS, GOOSE, SV) and Modbus/TCP. It is also investigated whether the selected protocols can be recognized in their encrypted version. Furthermore, it is investigated whether this encrypted traffic is recognizable from the use of VPN technology. Three convolutional neural network models were trained to recognize industrial protocols. These networks outperform traditional machine learning in pattern recognition in several areas of classification. By converting the captured traffic into image data that convolutional neural networks work with, differences in the encrypted traffic of different industrial protocols can be recognized. Three scenarios (1D, 2D, PKT) are presented using convolutional neural network models with 1D and 2D architectures. Training, testing and validation data are used to verify each scenario. An accuracy of 96-97% is achieved for the recognition of unencrypted and encrypted industrial protocols. According to the results, 2D convolutional neural network model is faster than 1D and PKT models. The 1D and 2D models are suitable for use in protocol specific networks. Another application of these models can be anomaly detection in these networks. The PKT model is useful in networks with multiple industry protocols because it can evaluate network traffic on a packet-by-packet basis.
引用
收藏
页数:11
相关论文
共 63 条
[1]   Applying Non-Nested Generalized Exemplars Classification for Cyber-Power Event and Intrusion Detection [J].
Adhikari, Uttam ;
Morris, Thomas H. ;
Pan, Shengyi .
IEEE TRANSACTIONS ON SMART GRID, 2018, 9 (05) :3928-3941
[2]   New Approach to Determine DDoS Attack Patterns on SCADA System Using Machine Learning [J].
Alhaidari, Fahd A. ;
Al-Dahasi, Ezaz Mohammed .
2019 INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCES (ICCIS), 2019, :541-546
[3]  
[Anonymous], 2005, Overview of DNP3 Protocol
[4]  
[Anonymous], 2006, International Standard IEC 60870-5-104
[5]  
Arifin MAS, 2021, 2021 8TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING, COMPUTERSCIENCE AND INFORMATICS (EECSI) 2021, P228, DOI 10.23919/EECSI53397.2021.9624255
[6]   Industrial control system device classification using network traffic features and neural network embeddings [J].
Chakraborty, Indrasis ;
Kelley, Brian M. ;
Gallagher, Brian .
Array, 2021, 12
[7]   Review of Security Issues in Industrial Networks [J].
Cheminod, Manuel ;
Durante, Luca ;
Valenzano, Adriano .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2013, 9 (01) :277-293
[8]   A Network Traffic Classification Model Based on Metric Learning [J].
Chen, Mo ;
Wang, Xiaojuan ;
He, Mingshu ;
Jin, Lei ;
Javeed, Khalid ;
Wang, Xiaojun .
CMC-COMPUTERS MATERIALS & CONTINUA, 2020, 64 (02) :941-959
[9]   Length matters: Scalable fast encrypted internet traffic service classification based on multiple protocol data unit length sequence with composite deep learning [J].
Chen, Zihan ;
Cheng, Guang ;
Xu, Ziheng ;
Guo, Shuyi ;
Zhou, Yuyang ;
Zhao, Yuyu .
DIGITAL COMMUNICATIONS AND NETWORKS, 2022, 8 (03) :289-302
[10]   Length Matters: Fast Internet Encrypted Traffic Service Classification based on Multi-PDU Lengths [J].
Chen, Zihan ;
Cheng, Guang ;
Jiang, Bomiao ;
Tang, Shuye ;
Guo, Shuyi ;
Zhou, Yuyang .
2020 16TH INTERNATIONAL CONFERENCE ON MOBILITY, SENSING AND NETWORKING (MSN 2020), 2020, :531-538