Identification method for malicious traffic in industrial Internet under new unknown attack scenarios
Topics:Technologies of Industrial Internet Security|更新时间:2024-08-08
|
Identification method for malicious traffic in industrial Internet under new unknown attack scenarios
Journal on CommunicationsVol. 45, Issue 6, Pages: 75-86(2024)
作者机构:
哈尔滨工程大学计算机科学与技术学院,黑龙江 哈尔滨 150009
作者简介:
基金信息:
The National Key Research and Development Program of China(2021YFB3101403);The National Natural Science Foundation of China(U2003206;U20B2048;U21B2019;U22A2036;62272127);The Natural Science Foundation of Heilongjiang Province(TD2022F001)
ZENG Fanyi,MAN Dapeng,XU Chen,et al.Identification method for malicious traffic in industrial Internet under new unknown attack scenarios[J].Journal on Communications,2024,45(06):75-86.
ZENG Fanyi,MAN Dapeng,XU Chen,et al.Identification method for malicious traffic in industrial Internet under new unknown attack scenarios[J].Journal on Communications,2024,45(06):75-86. DOI: 10.11959/j.issn.1000-436x.2024093.
Identification method for malicious traffic in industrial Internet under new unknown attack scenarios
Aiming at the problem of traffic data distribution shift caused by new unknown attacks in the industrial Internet
a malicious traffic identification method based on neighborhood filtering and stable learning was proposed to enhance the effectiveness and robustness of the existing graph neural network model in identifying known malicious traffic. Firstly
the graph structure of the traffic data was modeled to capture the topological relationship and interaction mode in communication behavior. Secondly
the traffic subgraph was divided based on the neighborhood filtering mechanism of biased sampling to eliminate the pseudo-homogeneity between communication behaviors. Finally
the statistical independence of high-dimensional traffic features was realized by applying graph representation learning and stable learning strategies
combined with adaptive sample weighting and collaborative loss optimization methods. The experimental results on two benchmark datasets show that compared with the baseline method
the recognition performance of the proposed method is increased by more than 2.7% in the new unknown attack scenario
which shows its high efficiency and practicability in the industrial Internet environment.
CAI Y P , LI D , XU C , et al . Integrating 5G-U with time-sensitive networking for industrial Internet: architectures and technologies [J ] . Journal on Communications , 2021 , 42 ( 10 ): 43 - 54 .
HUANG T , WANG S , HUANG Y D , et al . Survey of the deterministic network [J ] . Journal on Communications , 2019 , 40 ( 6 ): 160 - 176 .
NUAIMI M , FOURATI L C , HAMED B . Intelligent approaches toward intrusion detection systems for industrial Internet of things: a systematic comprehensive review [J ] . Journal of Network and Computer Applications , 2023 , 215 : 103637 .
FU C P , LI Q , XU K . Detecting unknown encrypted malicious traffic in real time via flow interaction graph analysis [J ] . arXiv Preprint , arXiv: 2301.13686 , 2023 .
WALI K N , ALSHEHRI MOHAMMED S , KHAN MUAZZAM A , et al . A hybrid deep learning-based intrusion detection system for IoT networks [J ] . Mathematical Biosciences and Engineering: MBE , 2023 , 20 ( 8 ): 13491 - 13520 .
LO W W , LAYEGHY S , SARHAN M , et al . E-GraphSAGE: a graph neural network based intrusion detection system for IoT [J ] . arXiv Preprint , arXiv: 2103.16329 , 2021 .
ALWASEL B , ALDRIBI A , ALRESHOODI M , et al . Leveraging graph-based representations to enhance machine learning performance in IIoT network security and attack detection [J ] . Applied Sciences , 2023 , 13 ( 13 ): 7774 .
CARLETTI V , FOGGIA P , VENTO M . Detecting abnormal communication patterns in IoT networks using graph neural networks [C ] // Proceedings of the Graph-Based Representations in Pattern Recognition . New York : ACM Press , 2023 : 127 - 138 .
ZHOU J W , XU Z Y , RUSH A M , et al . Automating botnet detection with graph neural networks [J ] . arXiv Preprint , arXiv: 2003.06344 , 2020 .
BOYACI O , UMUNNAKWE A , SAHU A , et al . Graph neural networks based detection of stealth false data injection attacks in smart grids [J ] . IEEE Systems Journal , 2022 , 16 ( 2 ): 2946 - 2957 .
DUAN G H , LV H W , WANG H Q , et al . Application of a dynamic line graph neural network for intrusion detection with semisupervised learning [J ] . IEEE Transactions on Information Forensics and Security , 2022 , 18 : 699 - 714 .
KUANG K , CUI P , ATHEY S , et al . Stable prediction across unknown environments [C ] // Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining . New York : ACM Press , 2018 : 1617 - 1626 .
LIA P Y , YAN J , SELLIER J M , et al . TADA: a transferable domain-adversarial training for smart grid intrusion detection based on ensemble divergence metrics and spatiotemporal features [J ] . Energies , 2022 , 15 ( 23 ): 8778 .
KHEDDAR H , HIMEUR Y , AWAD A I . Deep transfer learning for intrusion detection in industrial control networks: a comprehensive review [J ] . arXiv Preprint , arXiv: 2304.10550 , 2023 .
ARJOVSKY M , BOTTOU L , GULRAJANI I , et al . Invariant risk minimization [J ] . arXiv Preprint , arXiv: 1907.02893 , 2019 .
ZHANG X X , CUI P , XU R Z , et al . Deep stable learning for out-of-distribution generalization [J ] . arXiv Preprint , arXiv: 2104.07876 , 2021 .
REN M Y , ZENG W Y , YANG B , et al . Learning to reweight examples for robust deep learning [J ] . arXiv Preprint , arXiv: 1803.09050 , 2018 .
RAHIMI A , RECHT B . Random features for large-scale kernel machines [C ] // Proceedings of the 2007 Conference onNeural Information Processing Systems . New York : ACM Press , 2007 : 1177 - 1184 .
LI Z , TON J F , OGLIC D , et al . Towards A unified analysis of random Fourier featuresJ] . arXiv Preprint , arXiv: 1806.09178 , 2018 .
LI H Y , WANG X , ZHANG Z W , et al . OOD-GNN: out-of-distribution generalized graph neural network [J ] . IEEE Transactions on Knowledge and Data Engineering , 2023 , 35 ( 7 ): 7328 - 7340 .
WU Z R , XIONG Y J , YU S X , et al . Unsupervised feature learning via non-parametric instance discrimination [C ] // Proceedings of the 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition . Piscataway : IEEE Press , 2018 : 3733 - 3742 .
KORONIOTIS N , MOUSTAFA N , SITNIKOVA E , et al . Towards the development of realistic botnet dataset in the Internet of things for network forensic analytics: bot-IoT dataset [J ] . arXiv Preprint , arXiv: 1811.00701 , 2018 .
SARHAN M , LAYEGHY S , PORTMANN M . Towards a standard feature set for network intrusion detection system datasets [J ] . Mobile Networks and Applications , 2022 , 27 ( 1 ): 357 - 370 .
CHANG L Y , BRANCO P . Graph-based solutions with residuals for intrusion detection: the modified E-GraphSAGE and E-ResGAT algorithms [J ] . arXiv Preprint , arXiv: 2111.13597 , 2021 .
DATAR M , IMMORLICA N , INDYK P , et al . Locality-sensitive hashing scheme based on p-stable distributions [C ] // Proceedings of the Twentieth Annual Symposium on Computational Geometry . New York : ACM Press , 2004 : 253 - 262 .