Exploring the Power of Convolutional Neural Networks for Encrypted Industrial Protocols Recognition
The result's identifiers
Result code in IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216305%3A26220%2F24%3APU149997" target="_blank" >RIV/00216305:26220/24:PU149997 - isvavai.cz</a>
Result on the web
<a href="https://www.sciencedirect.com/science/article/abs/pii/S2352467723002771" target="_blank" >https://www.sciencedirect.com/science/article/abs/pii/S2352467723002771</a>
DOI - Digital Object Identifier
<a href="http://dx.doi.org/10.1016/j.segan.2023.101269" target="_blank" >10.1016/j.segan.2023.101269</a>
Alternative languages
Result language
angličtina
Original language name
Exploring the Power of Convolutional Neural Networks for Encrypted Industrial Protocols Recognition
Original language description
The main objective of this paper is to classify unencrypted and encrypted industrial protocols using deep learning, especially Convolutional Neural Networks. Protocol recognition is important for network security and network analysis. Overall knowledge of industrial protocols and networks is crucial, especially in operational technologies. Five industrial protocol standards are under investigation, namely IEC 60870-5-104, IEC 61850 (MMS, GOOSE, SV) and Modbus/TCP. It is also investigated whether the selected protocols can be recognized in their encrypted version. Furthermore, it is investigated whether this encrypted traffic is recognizable from the use of VPN technology. Three convolutional neural network models were trained to recognize industrial protocols. These networks outperform traditional machine learning in pattern recognition in several areas of classification. By converting the captured traffic into image data that convolutional neural networks work with, differences in the encrypted traffic of different industrial protocols can be recognized. Three scenarios (1D, 2D, PKT) are presented using convolutional neural network models with 1D and 2D architectures. Training, testing and validation data are used to verify each scenario. An accuracy of 96-97 % is achieved for the recognition of unencrypted and encrypted industrial protocols. According to the results, 2D convolutional neural network model is faster than 1D and PKT models. The 1D and 2D models are suitable for use in protocol specific networks. Another application of these models can be anomaly detection in these networks. The PKT model is useful in networks with multiple industry protocols because it can evaluate network traffic on a packet-by-packet basis.
Czech name
—
Czech description
—
Classification
Type
J<sub>imp</sub> - Article in a specialist periodical, which is included in the Web of Science database
CEP classification
—
OECD FORD branch
20203 - Telecommunications
Result continuities
Project
<a href="/en/project/FW07010004" target="_blank" >FW07010004: Utilization of Advantages of 5th Generation Network for Monitoring, Optimization and Effectiveness of Manufacturing Process in Smart Factories</a><br>
Continuities
P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)
Others
Publication year
2024
Confidentiality
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Data specific for result type
Name of the periodical
Sustainable Energy, Grids and Networks
ISSN
2352-4677
e-ISSN
—
Volume of the periodical
38
Issue of the periodical within the volume
June 2024
Country of publishing house
GB - UNITED KINGDOM
Number of pages
11
Pages from-to
1-11
UT code for WoS article
001172210100001
EID of the result in the Scopus database
2-s2.0-85182874251