skip to main content
10.1145/3508072.3508193acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicfndsConference Proceedingsconference-collections
research-article

Method for filtering encrypted traffic using a neural network between an Industrial Internet of things system and Digital Twin

Authors Info & Claims
Published:13 April 2022Publication History

ABSTRACT

Several traffic optimization approaches are available nowadays, including compression, packet deduplication, specialized hardware and software solutions, application optimization, and neural network utilization. However, the inclination to approach data to consumers and transfer data to the periphery necessitates the employment of novel (perhaps combining the use of known) ways to handle the problem, while keeping in mind that most traffic is encrypted, and the proposed solution should be “transparent” to end-users. The article presents a technique for isolating encrypted IoT traffic, and a study of its effectiveness using a neural network in encrypted SSL sessions has been carried out.

References

  1. Lu Yuqian 2020. Digital Twin-driven smart manufacturing: Connotation, reference model, applications and research issues. Robotics and Computer-Integrated Manufacturing, 61, 101837.Google ScholarGoogle ScholarCross RefCross Ref
  2. Reinsel David, Rydning John and Gantz John. 2021. Worldwide global datasphere forecast, 2021–2025: The world keeps creating more data—now, what do we do with it all.Google ScholarGoogle Scholar
  3. Khari Manju, Garg Aditya Kumar, Gandomi Amir H., Gupta Rashmi, Patan Rizwan, and Balusamy Balamurugan. 2019. Securing data in Internet of Things (IoT) using cryptography and steganography techniques. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 50(1), 73-80.Google ScholarGoogle Scholar
  4. Elhoseny Mohamed, and Hassanien Aboul Ella. 2019. Secure data transmission in WSN: an overview. Dynamic wireless sensor networks, 115-143.Google ScholarGoogle Scholar
  5. Chen Mingzhe, Challita Ursula, Saad Walid, Yin Changchuan, and Debbah M'erouane. 2019. Artificial neural networks-based machine learning for wireless networks: A tutorial. IEEE Communications Surveys & Tutorials, 21(4), 3039-3071.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Lopez-Martin Manuel, Carro Belen, Sanchez-Esguevillas Antonio, and Lloret Jaime. 2017. Network traffic classifier with convolutional and recurrent neural networks for Internet of Things. IEEE Access, 5, 18042-18050.Google ScholarGoogle ScholarCross RefCross Ref
  7. Luo Tie, and Nagarajan Sai G. 2018. Distributed anomaly detection using autoencoder neural networks in WSN for IoT. In 2018 IEEE international conference on communications (ICC), IEEE, 1-6.Google ScholarGoogle Scholar
  8. Abdellah Ali, Mahmood Omar Abdulkareem, Kirichek Ruslan, Paramonov Alexander, and Koucheryavy Andrey. 2021. Machine Learning Algorithm for Delay Prediction in IoT and Tactile Internet. Future Internet, 13(12), 304.Google ScholarGoogle ScholarCross RefCross Ref
  9. Smys S., Chen Joy Iong Zong, and Shakya Subarna. 2020. Survey on Neural Network Architectures with Deep Learning. Journal of Soft Computing Paradigm (JSCP), 2(03), 186-194.Google ScholarGoogle ScholarCross RefCross Ref
  10. Yu Hwanjo. 2009. Support Vector Machine. In: LIU L., ÖZSU M.T. (eds) Encyclopedia of Database Systems. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-39940-9_557Google ScholarGoogle Scholar
  11. Hand David , Smyth Padhraic, and Mannila Heikki. 2001. Principles of data mining. MIT Press, Cambridge, MA, USA.Google ScholarGoogle Scholar
  12. Jahwar Alan Fuad, and Abdulazeez Adnan Mohsin. 2020. Meta-heuristic algorithms for k-means clustering: A review. PalArch's Journal of Archaeology of Egypt/Egyptology, 17(7), 12002-12020.Google ScholarGoogle Scholar
  13. Lozano Sebastian, Guerrero Fernando, Onieva Luis, and Larraneta Juan. 1998. Kohonen maps for solving a class of location-allocation problems. European Journal of operational research, 108(1), 106-117. https://doi.org/10.1016/S0377-2217(97)00046-5.Google ScholarGoogle Scholar
  14. Mor Bhavya, Garhwal Sunita, and Kumar Ajay. 2021. A Systematic Review of Hidden Markov Models and Their Applications. Archives of computational methods in engineering, 28(3).Google ScholarGoogle Scholar
  15. Fischer Asja, and Igel Christian. 2014. Training restricted Boltzmann machines: An introduction. Pattern Recognition, 47(1), 25-39. https://doi.org/10.1016/j.patcog.2013.05.025.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Tran Son N, and Garcez Artur S d'Avila. 2016. Deep logic networks: Inserting and extracting knowledge from deep belief networks. IEEE transactions on neural networks and learning systems, 29(2), 246-258. DOI: 10.1109/TNNLS.2016.2603784.Google ScholarGoogle Scholar
  17. Open Networking Foundation. 2011. OpenFlow/Software-Defined Networking (SDN). https://www.opennetworking.org/.Google ScholarGoogle Scholar
  18. Slepnev Aleksey, Karelin Evgenii, Luksha Ivan, Kirichek Ruslan, Zadorozhnyaya Alina, Makarov Eugene. 2021. Virtualization of Control Systems in IoT using Neural Networks. In 2021 13th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), IEEE, 236-240.Google ScholarGoogle Scholar
  19. Berezkin Aleksandr, Zadorozhnyaya Alina, Kukunin Dmitry, Matveev Daniil, Kraeva Ekaterina. 2021. Models and Methods for Decoding of Error-Correcting Codes based on a Neural. In 2021 13th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), IEEE, 230-235.Google ScholarGoogle Scholar
  20. Dainotti Alberto, Pescape Antonio, and Claffy Kimberly. 2012. Issues and future directions in traffic classification. IEEE network, 26(1), 35-40.Google ScholarGoogle Scholar
  21. Tahaei Hamid, Afifi Firdaus, Asemi Adeleh, Zaki Faiz, and Anuar Nor Badrul. 2020. The rise of traffic classification in IoT networks: A survey. Journal of Network and Computer Applications, 154, 102538.Google ScholarGoogle ScholarCross RefCross Ref
  22. Alzahrani Rami J, and Alzahrani Ahmed. 2021. Survey of Traffic Classification Solution in IoT Networks. International Journal of Computer Applications, 975, 8887.Google ScholarGoogle Scholar
  23. Do Phuc Hao, Dinh Truong Duy, Le Tran Duc, Pham Van Dai, Myrova Lyudmila, Kirichek Ruslan. 2021. An Efficient Feature Extraction Method for Attack Classification in IoT Networks. In 2021 13th International Congress on Ultra-Modern Telecommunications and Control Systems and Workshops (ICUMT), IEEE, 194-199.Google ScholarGoogle Scholar

Index Terms

  1. Method for filtering encrypted traffic using a neural network between an Industrial Internet of things system and Digital Twin
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          ICFNDS 2021: The 5th International Conference on Future Networks & Distributed Systems
          December 2021
          847 pages
          ISBN:9781450387347
          DOI:10.1145/3508072

          Copyright © 2021 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 13 April 2022

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed limited
        • Article Metrics

          • Downloads (Last 12 months)15
          • Downloads (Last 6 weeks)0

          Other Metrics

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format .

        View HTML Format