EconPapers    
Economics at your fingertips  
 

Malicious Traffic Classification via Edge Intelligence in IIoT

Maoli Wang (), Bowen Zhang, Xiaodong Zang (), Kang Wang and Xu Ma
Additional contact information
Maoli Wang: School of Cyber Science and Engineering, Qufu Normal University, Qufu 273165, China
Bowen Zhang: School of Cyber Science and Engineering, Qufu Normal University, Qufu 273165, China
Xiaodong Zang: School of Cyber Science and Engineering, Qufu Normal University, Qufu 273165, China
Kang Wang: School of Cyber Science and Engineering, Qufu Normal University, Qufu 273165, China
Xu Ma: School of Cyber Science and Engineering, Qufu Normal University, Qufu 273165, China

Mathematics, 2023, vol. 11, issue 18, 1-17

Abstract: The proliferation of smart devices in the 5G era of industrial IoT (IIoT) produces significant traffic data, some of which is encrypted malicious traffic, creating a significant problem for malicious traffic detection. Malicious traffic classification is one of the most efficient techniques for detecting malicious traffic. Although it is a labor-intensive and time-consuming process to gather large labeled datasets, the majority of prior studies on the classification of malicious traffic use supervised learning approaches and provide decent classification results when a substantial quantity of labeled data is available. This paper proposes a semi-supervised learning approach for classifying malicious IIoT traffic. The approach utilizes the encoder–decoder model framework to classify the traffic, even with a limited amount of labeled data available. We sample and normalize the data during the data-processing stage. In the semi-supervised model-building stage, we first pre-train a model on a large unlabeled dataset. Subsequently, we transfer the learned weights to a new model, which is then retrained using a small labeled dataset. We also offer an edge intelligence model that considers aspects such as computation latency, transmission latency, and privacy protection to improve the model’s performance. To achieve the lowest total latency and to reduce the risk of privacy leakage, we first create latency and privacy-protection models for each local, edge, and cloud. Then, we optimize the total latency and overall privacy level. In the study of IIoT malicious traffic classification, experimental results demonstrate that our method reduces the model training and classification time with 97.55% accuracy; moreover, our approach boosts the privacy-protection factor.

Keywords: industrial internet of things; encrypted malicious traffic classification; semi-supervised learning; edge intelligence (search for similar items in EconPapers)
JEL-codes: C (search for similar items in EconPapers)
Date: 2023
References: View complete reference list from CitEc
Citations:

Downloads: (external link)
https://www.mdpi.com/2227-7390/11/18/3951/pdf (application/pdf)
https://www.mdpi.com/2227-7390/11/18/3951/ (text/html)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:gam:jmathe:v:11:y:2023:i:18:p:3951-:d:1241820

Access Statistics for this article

Mathematics is currently edited by Ms. Emma He

More articles in Mathematics from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().

 
Page updated 2025-03-19
Handle: RePEc:gam:jmathe:v:11:y:2023:i:18:p:3951-:d:1241820