Exploring the power of convolutional neural networks for encrypted industrial protocols recognition

被引:2
作者
Holasova, Eva [1 ]
Blazek, Petr [1 ]
Fujdiak, Radek [1 ]
Masek, Jan [1 ]
Misurec, Jiri [1 ]
机构
[1] Brno Univ Technol, Fac Elect Engn & Commun, Dept Telecommun, Technicka 12, Brno 616 00, Czech Republic
关键词
Convolutional neural network; Encrypted traffic; Industrial protocols; Operational technology; Protocol recognition; Virtual private network; TRAFFIC CLASSIFICATION; ANOMALY DETECTION;
D O I
10.1016/j.segan.2023.101269
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
The main objective of this paper is to classify unencrypted and encrypted industrial protocols using deep learning, especially Convolutional Neural Networks. Protocol recognition is important for network security and network analysis. Overall knowledge of industrial protocols and networks is crucial, especially in operational technologies. Five industrial protocol standards are under investigation, namely IEC 60870-5-104, IEC 61850 (MMS, GOOSE, SV) and Modbus/TCP. It is also investigated whether the selected protocols can be recognized in their encrypted version. Furthermore, it is investigated whether this encrypted traffic is recognizable from the use of VPN technology. Three convolutional neural network models were trained to recognize industrial protocols. These networks outperform traditional machine learning in pattern recognition in several areas of classification. By converting the captured traffic into image data that convolutional neural networks work with, differences in the encrypted traffic of different industrial protocols can be recognized. Three scenarios (1D, 2D, PKT) are presented using convolutional neural network models with 1D and 2D architectures. Training, testing and validation data are used to verify each scenario. An accuracy of 96-97% is achieved for the recognition of unencrypted and encrypted industrial protocols. According to the results, 2D convolutional neural network model is faster than 1D and PKT models. The 1D and 2D models are suitable for use in protocol specific networks. Another application of these models can be anomaly detection in these networks. The PKT model is useful in networks with multiple industry protocols because it can evaluate network traffic on a packet-by-packet basis.
引用
收藏
页数:11
相关论文
共 65 条
  • [11] Length matters: Scalable fast encrypted internet traffic service classification based on multiple protocol data unit length sequence with composite deep learning
    Chen, Zihan
    Cheng, Guang
    Xu, Ziheng
    Guo, Shuyi
    Zhou, Yuyang
    Zhao, Yuyu
    [J]. DIGITAL COMMUNICATIONS AND NETWORKS, 2022, 8 (03) : 289 - 302
  • [12] Length Matters: Fast Internet Encrypted Traffic Service Classification based on Multi-PDU Lengths
    Chen, Zihan
    Cheng, Guang
    Jiang, Bomiao
    Tang, Shuye
    Guo, Shuyi
    Zhou, Yuyang
    [J]. 2020 16TH INTERNATIONAL CONFERENCE ON MOBILITY, SENSING AND NETWORKING (MSN 2020), 2020, : 531 - 538
  • [13] CAPC: Packet-Based Network Service Classifier With Convolutional Autoencoder
    Chiu, Kai-Cheng
    Liu, Chien-Chang
    Chou, Li-Der
    [J]. IEEE ACCESS, 2020, 8 : 218081 - 218094
  • [14] Network Traffic Classification Using Supervised Learning Algorithms
    Choudhury, Mira Rani
    Muraleedharan, N.
    Acharjee, Parimal
    George, Aleena Terese
    [J]. 2023 INTERNATIONAL CONFERENCE ON COMPUTER, ELECTRICAL & COMMUNICATION ENGINEERING, ICCECE, 2023,
  • [15] Encrypted DNP3 Traffic Classification Using Supervised Machine Learning Algorithms
    de Toledo, Thais
    Torrisi, Nunzio
    [J]. MACHINE LEARNING AND KNOWLEDGE EXTRACTION, 2019, 1 (01): : 384 - 399
  • [16] Cyber Threats to Smart Grids: Review, Taxonomy, Potential Solutions, and Future Directions
    Ding, Jianguo
    Qammar, Attia
    Zhang, Zhimin
    Karim, Ahmad
    Ning, Huansheng
    [J]. ENERGIES, 2022, 15 (18)
  • [17] CETAnalytics: Comprehensive effective traffic information analytics for encrypted traffic classification
    Dong, Cong
    Zhang, Chen
    Lu, Zhigang
    Liu, Baoxu
    Jiang, Bo
    [J]. COMPUTER NETWORKS, 2020, 176
  • [18] Draper-Gil Gerard, 2016, ICISSP 2016. 2nd International Conference on Information Systems Security and Privacy. Proceedings, P407
  • [19] Comparison of approaches for intrusion detection in substations using the IEC 60870-5-104 protocol
    Egger M.
    Eibl G.
    Engel D.
    [J]. Egger, Michael (michael.egger@apg.at), 1600, Springer Nature (03)
  • [20] Feng WB, 2020, CHINA COMMUN, V17, P125, DOI 10.23919/JCC.2020.04.012