Malicious Traffic Classification via Edge Intelligence in IIoT

被引:2
作者
Wang, Maoli [1 ]
Zhang, Bowen [1 ]
Zang, Xiaodong [1 ]
Wang, Kang [1 ]
Ma, Xu [1 ]
机构
[1] Qufu Normal Univ, Sch Cyber Sci & Engn, Qufu 273165, Peoples R China
关键词
industrial internet of things; encrypted malicious traffic classification; semi-supervised learning; edge intelligence; INDUSTRIAL INTERNET; NETWORK; THINGS;
D O I
10.3390/math11183951
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
The proliferation of smart devices in the 5G era of industrial IoT (IIoT) produces significant traffic data, some of which is encrypted malicious traffic, creating a significant problem for malicious traffic detection. Malicious traffic classification is one of the most efficient techniques for detecting malicious traffic. Although it is a labor-intensive and time-consuming process to gather large labeled datasets, the majority of prior studies on the classification of malicious traffic use supervised learning approaches and provide decent classification results when a substantial quantity of labeled data is available. This paper proposes a semi-supervised learning approach for classifying malicious IIoT traffic. The approach utilizes the encoder-decoder model framework to classify the traffic, even with a limited amount of labeled data available. We sample and normalize the data during the data-processing stage. In the semi-supervised model-building stage, we first pre-train a model on a large unlabeled dataset. Subsequently, we transfer the learned weights to a new model, which is then retrained using a small labeled dataset. We also offer an edge intelligence model that considers aspects such as computation latency, transmission latency, and privacy protection to improve the model's performance. To achieve the lowest total latency and to reduce the risk of privacy leakage, we first create latency and privacy-protection models for each local, edge, and cloud. Then, we optimize the total latency and overall privacy level. In the study of IIoT malicious traffic classification, experimental results demonstrate that our method reduces the model training and classification time with 97.55% accuracy; moreover, our approach boosts the privacy-protection factor.
引用
收藏
页数:17
相关论文
共 44 条
  • [1] IoT transaction processing through cooperative concurrency control on fog-cloud computing environment
    Al-Qerem, Ahmad
    Alauthman, Mohammad
    Almomani, Ammar
    Gupta, B. B.
    [J]. SOFT COMPUTING, 2020, 24 (08) : 5695 - 5711
  • [2] Only Header: a reliable encrypted traffic classification framework without privacy risk
    Cui, Susu
    Liu, Jian
    Dong, Cong
    Lu, Zhigang
    Du, Dan
    [J]. SOFT COMPUTING, 2022, 26 (24) : 13391 - 13403
  • [3] Edge Intelligence-Based Ultra-Reliable and Low-Latency Communications for Digital Twin-Enabled Metaverse
    Dang Van Huynh
    Khosravirad, Saeed R.
    Masaracchia, Antonino
    Dobre, Octavia A.
    Duong, Trung Q.
    [J]. IEEE WIRELESS COMMUNICATIONS LETTERS, 2022, 11 (08) : 1733 - 1737
  • [4] A Hybrid CNN-LSTM Model for IIoT Edge Privacy-Aware Intrusion Detection
    de Elias, Erik Miguel
    Carriel, Vinicius Sanches
    de Oliveira, Guilherme Werneck
    dos Santos, Aldri Luiz
    Nogueira, Michele
    Hirata Junior, Roberto
    Batista, Daniel Macedo
    [J]. 2022 IEEE LATIN-AMERICAN CONFERENCE ON COMMUNICATIONS (LATINCOM), 2022,
  • [5] An Algorithm for Detection of Traffic Attribute Exceptions Based on Cluster Algorithm in Industrial Internet of Things
    Fu, Lidong
    Zhang, Wenbo
    Tan, Xiaobo
    Zhu, Hongbo
    [J]. IEEE ACCESS, 2021, 9 : 53370 - 53378
  • [6] An encoder-decoder model based on deep learning for state of health estimation of lithium-ion battery
    Gong, Qingrui
    Wang, Ping
    Cheng, Ze
    [J]. JOURNAL OF ENERGY STORAGE, 2022, 46
  • [7] Edge Intelligence-Driven Joint Offloading and Resource Allocation for Future 6G Industrial Internet of Things
    Gong, Yongkang
    Yao, Haipeng
    Wang, Jingjing
    Li, Maozhen
    Guo, Song
    [J]. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 11 (06): : 5644 - 5655
  • [8] Deep-Feature-Based Autoencoder Network for Few-Shot Malicious Traffic Detection
    He, Mingshu
    Wang, Xiaojuan
    Zhou, Junhua
    Xi, Yuanyuan
    Jin, Lei
    Wang, Xinlei
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [9] Prediction of IIoT traffic using a modified whale optimization approach integrated with random forest classifier
    Ikram, Sumaiya Thaseen
    Priya, V
    Anbarasu, B.
    Cheng, Xiaochun
    Ghalib, Muhammad Rukunuddin
    Shankar, Achyut
    [J]. JOURNAL OF SUPERCOMPUTING, 2022, 78 (08) : 10725 - 10756
  • [10] An intelligent traffic detection approach for vehicles on highway using pattern recognition and deep learning
    Jin, Ming
    Sun, Chuanxia
    Hu, Yinglei
    [J]. SOFT COMPUTING, 2023, 27 (08) : 5041 - 5052