Malicious Traffic Classification via Edge Intelligence in IIoT

نویسندگان

چکیده

The proliferation of smart devices in the 5G era industrial IoT (IIoT) produces significant traffic data, some which is encrypted malicious traffic, creating a problem for detection. Malicious classification one most efficient techniques detecting traffic. Although it labor-intensive and time-consuming process to gather large labeled datasets, majority prior studies on use supervised learning approaches provide decent results when substantial quantity data available. This paper proposes semi-supervised approach classifying IIoT utilizes encoder–decoder model framework classify even with limited amount We sample normalize during data-processing stage. In model-building stage, we first pre-train unlabeled dataset. Subsequently, transfer learned weights new model, then retrained using small also offer an edge intelligence that considers aspects such as computation latency, transmission privacy protection improve model’s performance. To achieve lowest total latency reduce risk leakage, create privacy-protection models each local, edge, cloud. Then, optimize overall level. study classification, experimental demonstrate our method reduces training time 97.55% accuracy; moreover, boosts factor.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Characterization and classification of malicious Web traffic

Web systems commonly face unique set of vulnerabilities and security threats due to their high exposure, access by browsers, and integration with databases. This study is focused on characterization and classification of malicious cyber activities aimed at Web systems. The empirical analysis is based on three datasets, each in duration of four to five months, collected by high-interaction honey...

متن کامل

Machine Learning Classification of Malicious Network Traffic

1.1. Intrusion Detection Systems. In our society, information systems are everywhere. They are used by corporations to store proprietary and other sensitive data, by families to store financial and personal information, by universities to keep research data and ideas, and by governments to store defense and security information. It is very important that the information systems that house this ...

متن کامل

Towards Fingerprinting Malicious Traffic

The primary intent of this paper is detect malicious traffic at the network level. To this end, we apply several machine learning techniques to build classifiers that fingerprint maliciousness on IP traffic. As such, J48, Naı̈ve Bayesian, SVM and Boosting algorithms are used to classify malware communications that are generated from dynamic malware analysis framework. The generated traffic log f...

متن کامل

Classification of Malicious Network Activity

As more and more vital services today (e.g. email, Facebook, quantitative trading) depend on machine learning algorithms, there is a greater incentive than ever for adversaries to manipulate these algorithms for malicious ends (e.g. spam, identity theft, cyberattacks). The field of adversarial learning has arisen out of a need to design learning algorithms that are robust to these sort of disru...

متن کامل

Effect of Malicious Traffic on the Network

The Internet has witnessed a steady rise in malicious traffic including DDoS and worm attacks. In this paper, we study the effect of malicious traffic on the background traffic by analyzing recent traces from two different locations. We show that malicious traffic causes an increase in the average DNS latency by 230% and an increase in the average web latency by 30% even on highly over-provisio...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Mathematics

سال: 2023

ISSN: ['2227-7390']

DOI: https://doi.org/10.3390/math11183951