Edge Intelligence Based Identification and Classification of Encrypted Traffic of Internet of Things

被引:8
|
作者
Zhao, Yue [1 ]
Yang, Yarang [2 ]
Tian, Bo [1 ]
Yang, Jin [3 ]
Zhang, Tianyi [4 ]
Hu, Ning [5 ,6 ]
机构
[1] Sci & Technol Commun Secur Lab, Chengdu 610041, Peoples R China
[2] Kashi Univ, Coll Phys & Elect Engn, Kashi 844006, Peoples R China
[3] Sichuan Univ, Coll Cyber Secur, Chengdu 610065, Peoples R China
[4] Chiba Univ, Grad Sch Adv Integrat Sci, Chiba 2638522, Japan
[5] Cyberspace Secur Res Ctr, Peng Cheng Lab, Shenzhen 518000, Peoples R China
[6] Guangzhou Univ, Cyberspace Inst Adv Technol, Guangzhou 510006, Peoples R China
基金
中国国家自然科学基金;
关键词
Cryptography; Logic gates; Internet of Things; Protocols; Malware; Encryption; Machine learning algorithms; edge intelligence; encrypted traffic; identification and classification; IoT gateway;
D O I
10.1109/ACCESS.2021.3056216
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A detection model of Internet of Things encrypted traffic based on edge intelligence is proposed in the paper, which can reduce the communication times of distributed Internet of Things gateways in the process of edge intelligence as well as the encrypted traffic detection model establishment time, in order to solve the problems that it is difficult to carry out efficient classification and accurate identification of the encrypted traffic of Internet of Things. In this paper, four new classification and identification methods for encrypted traffic are put forward, namely time-sequence behavior analysis, dynamic behavior analysis, key behavior analysis and two-round filtering analysis. The experimental results show that when the sample size is 1600, the encrypted traffic detection model establishment time is less than 100 seconds, and the accuracy of all the four new traffic classification methods is more than 92% and the recall rates of them are more than 83%.
引用
收藏
页码:21895 / 21903
页数:9
相关论文
共 50 条
  • [21] Research on malicious traffic identification technology in encrypted traffic
    Zeng Y.
    Wu Z.
    Dong L.
    Liu Z.
    Ma J.
    Li Z.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2021, 48 (03): : 170 - 187
  • [22] Malicious Traffic Classification via Edge Intelligence in IIoT
    Wang, Maoli
    Zhang, Bowen
    Zang, Xiaodong
    Wang, Kang
    Ma, Xu
    MATHEMATICS, 2023, 11 (18)
  • [23] Person Re-Identification Microservice over Artificial Intelligence Internet of Things Edge Computing Gateway
    Chen, Ching-Han
    Liu, Chao-Tsu
    ELECTRONICS, 2021, 10 (18)
  • [24] A Survey on Encrypted Traffic Classification
    Cao, Zigang
    Xiong, Gang
    Zhao, Yong
    Li, Zhenzhen
    Guo, Li
    APPLICATIONS AND TECHNIQUES IN INFORMATION SECURITY, ATIS 2014, 2014, 490 : 73 - 81
  • [25] FedETC: Encrypted traffic classification based on federated learning
    Jin, Zhiping
    Duan, Ke
    Chen, Changhui
    He, Meirong
    Jiang, Shan
    Xue, Hanxiao
    HELIYON, 2024, 10 (16)
  • [26] Dynamic traffic classification algorithm and simulation of energy Internet of things based on machine learning
    Liu, Dunnan
    Xu, Xiaofeng
    Liu, Mingguang
    Liu, Yaling
    NEURAL COMPUTING & APPLICATIONS, 2021, 33 (09) : 3967 - 3976
  • [27] Dynamic traffic classification algorithm and simulation of energy Internet of things based on machine learning
    Dunnan Liu
    Xiaofeng Xu
    Mingguang Liu
    Yaling Liu
    Neural Computing and Applications, 2021, 33 : 3967 - 3976
  • [28] Toward Edge Intelligence: Multiaccess Edge Computing for 5G and Internet of Things
    Liu, Yaqiong
    Peng, Mugen
    Shou, Guochu
    Chen, Yudong
    Chen, Siyu
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (08): : 6722 - 6747
  • [29] Bring Intelligence to Ports Based on Internet of Things
    Li, Suying
    Ma, Zhenzhou
    Han, Peitao
    Zhao, Siyang
    Guo, Peiying
    Dai, Hepeng
    CLOUD COMPUTING AND SECURITY, PT V, 2018, 11067 : 128 - 137
  • [30] Edge Computing for Internet of Things Based on FPGA
    Ferdian, Rian
    Aisuwarya, Ratna
    Erlina, Tati
    2020 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY SYSTEMS AND INNOVATION (ICITSI), 2020, : 20 - 23