Malicious Traffic Classification via Edge Intelligence in IIoT

被引:2
作者
Wang, Maoli [1 ]
Zhang, Bowen [1 ]
Zang, Xiaodong [1 ]
Wang, Kang [1 ]
Ma, Xu [1 ]
机构
[1] Qufu Normal Univ, Sch Cyber Sci & Engn, Qufu 273165, Peoples R China
关键词
industrial internet of things; encrypted malicious traffic classification; semi-supervised learning; edge intelligence; INDUSTRIAL INTERNET; NETWORK; THINGS;
D O I
10.3390/math11183951
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
The proliferation of smart devices in the 5G era of industrial IoT (IIoT) produces significant traffic data, some of which is encrypted malicious traffic, creating a significant problem for malicious traffic detection. Malicious traffic classification is one of the most efficient techniques for detecting malicious traffic. Although it is a labor-intensive and time-consuming process to gather large labeled datasets, the majority of prior studies on the classification of malicious traffic use supervised learning approaches and provide decent classification results when a substantial quantity of labeled data is available. This paper proposes a semi-supervised learning approach for classifying malicious IIoT traffic. The approach utilizes the encoder-decoder model framework to classify the traffic, even with a limited amount of labeled data available. We sample and normalize the data during the data-processing stage. In the semi-supervised model-building stage, we first pre-train a model on a large unlabeled dataset. Subsequently, we transfer the learned weights to a new model, which is then retrained using a small labeled dataset. We also offer an edge intelligence model that considers aspects such as computation latency, transmission latency, and privacy protection to improve the model's performance. To achieve the lowest total latency and to reduce the risk of privacy leakage, we first create latency and privacy-protection models for each local, edge, and cloud. Then, we optimize the total latency and overall privacy level. In the study of IIoT malicious traffic classification, experimental results demonstrate that our method reduces the model training and classification time with 97.55% accuracy; moreover, our approach boosts the privacy-protection factor.
引用
收藏
页数:17
相关论文
共 44 条
  • [21] A novel approach based on adaptive online analysis of encrypted traffic for identifying Malware in IIoT
    Niu, Zequn
    Xue, Jingfeng
    Qu, Dacheng
    Wang, Yong
    Zheng, Jun
    Zhu, Hongfei
    [J]. INFORMATION SCIENCES, 2022, 601 : 162 - 174
  • [22] Application Domain-Based Overview of IoT Network Traffic Characteristics
    Pekar, Adrian
    Mocnej, Jozef
    Seah, Winston K. G.
    Zolotova, Iveta
    [J]. ACM COMPUTING SURVEYS, 2020, 53 (04)
  • [23] A Blockchain-Driven IIoT Traffic Classification Service for Edge Computing
    Qi, Heng
    Wang, Junxiao
    Li, Wenxin
    Wang, Yuxin
    Qiu, Tie
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (04) : 2124 - 2134
  • [24] Deep Learning for Encrypted Traffic Classification: An Overview
    Rezaei, Shahbaz
    Liu, Xin
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2019, 57 (05) : 76 - 81
  • [25] A novel fully convolutional neural network approach for detection and classification of attacks on industrial IoT devices in smart manufacturing systems
    Shahin, Mohammad
    Chen, F. Frank
    Bouzary, Hamed
    Hosseinzadeh, Ali
    Rashidifar, Rasoul
    [J]. INTERNATIONAL JOURNAL OF ADVANCED MANUFACTURING TECHNOLOGY, 2022, 123 (5-6) : 2017 - 2029
  • [26] Shapira T, 2019, IEEE CONF COMPUT, P680, DOI [10.1109/infcomw.2019.8845315, 10.1109/INFCOMW.2019.8845315]
  • [27] Machine learning and IoTs for forecasting prediction of smart road traffic flow
    Sun Chuanxia
    Zhang Han
    Yin Peixuan
    [J]. SOFT COMPUTING, 2023, 27 (01) : 323 - 335
  • [28] Privacy Preserved Secure Offloading in the Multi-access Edge Computing Network
    Sun, Yang
    Li, Na
    Tao, Xiaofeng
    [J]. 2021 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE WORKSHOPS (WCNCW), 2021,
  • [29] A Survey of Techniques for Mobile Service Encrypted Traffic Classification Using Deep Learning
    Wang, Pan
    Chen, Xuejiao
    Ye, Feng
    Sun, Zhixin
    [J]. IEEE ACCESS, 2019, 7 : 54024 - 54033
  • [30] Abnormal traffic detection-based on memory augmented generative adversarial IIoT-assisted network
    Wang, Tao
    Li, Wenwei
    Rong, Huigui
    Yue, Ziqiao
    Zhou, Jiancun
    [J]. WIRELESS NETWORKS, 2022, 28 (06) : 2579 - 2595