Network Traffic Fingerprinting for IIoT Device Identification: A Survey

IF 9.9 1区 计算机科学 Q1 AUTOMATION & CONTROL SYSTEMS IEEE Transactions on Industrial Informatics Pub Date : 2025-02-17 DOI:10.1109/TII.2025.3534441
Chuan Sheng;Wei Zhou;Qing-Long Han;Wanlun Ma;Xiaogang Zhu;Sheng Wen;Yang Xiang
{"title":"Network Traffic Fingerprinting for IIoT Device Identification: A Survey","authors":"Chuan Sheng;Wei Zhou;Qing-Long Han;Wanlun Ma;Xiaogang Zhu;Sheng Wen;Yang Xiang","doi":"10.1109/TII.2025.3534441","DOIUrl":null,"url":null,"abstract":"As the Industrial Internet of Things (IIoT) continues to expand, the need for effective device identification becomes critical for securing industrial environments. Network traffic fingerprinting has emerged as an important technique for IIoT device identification, leveraging the unique communication patterns embedded in network traffic. Despite significant efforts in this area, a comprehensive overview of the relevant research is still missing. To address the lack of comprehensive research, this paper, for the first time, identifies critical knowledge gaps constraining IIoT device identification through network traffic analysis: obscure fingerprint feature space, limited generalizability to unknowns, and scarce data sources. Focusing on these gaps, existing methods are analyzed and summarized in detail across network traffic fingerprinting, IIoT device identification, and public IIoT datasets. Specifically, network traffic fingerprinting methods are categorized into three levels: Packet-level, flow-level, and business-level, and relevant methods are examined in terms of data formats, segmentation units, and extraction or generation techniques. In the context of IIoT device identification, tasks such as device type, model, and instance recognition, as well as abnormal device detection, are extensively investigated using rule-based, traditional machine learning- based, and deep learning-based approaches, with a focus on device fingerprints and application scenarios. Furthermore, main public datasets from the IoT, ICS, and IIoT scenarios are highlighted to support the development of fingerprinting and identification methods. Finally, several future research directions are proposed to guide new advancements in this area.","PeriodicalId":13301,"journal":{"name":"IEEE Transactions on Industrial Informatics","volume":"21 5","pages":"3541-3554"},"PeriodicalIF":9.9000,"publicationDate":"2025-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Industrial Informatics","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10891242/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

As the Industrial Internet of Things (IIoT) continues to expand, the need for effective device identification becomes critical for securing industrial environments. Network traffic fingerprinting has emerged as an important technique for IIoT device identification, leveraging the unique communication patterns embedded in network traffic. Despite significant efforts in this area, a comprehensive overview of the relevant research is still missing. To address the lack of comprehensive research, this paper, for the first time, identifies critical knowledge gaps constraining IIoT device identification through network traffic analysis: obscure fingerprint feature space, limited generalizability to unknowns, and scarce data sources. Focusing on these gaps, existing methods are analyzed and summarized in detail across network traffic fingerprinting, IIoT device identification, and public IIoT datasets. Specifically, network traffic fingerprinting methods are categorized into three levels: Packet-level, flow-level, and business-level, and relevant methods are examined in terms of data formats, segmentation units, and extraction or generation techniques. In the context of IIoT device identification, tasks such as device type, model, and instance recognition, as well as abnormal device detection, are extensively investigated using rule-based, traditional machine learning- based, and deep learning-based approaches, with a focus on device fingerprints and application scenarios. Furthermore, main public datasets from the IoT, ICS, and IIoT scenarios are highlighted to support the development of fingerprinting and identification methods. Finally, several future research directions are proposed to guide new advancements in this area.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
用于工业物联网设备识别的网络流量指纹:综述
随着工业物联网(IIoT)的不断扩展,对有效设备识别的需求对于保护工业环境变得至关重要。网络流量指纹已经成为工业物联网设备识别的重要技术,利用嵌入在网络流量中的独特通信模式。尽管在这一领域做出了重大努力,但仍缺乏对相关研究的全面概述。为了解决缺乏全面研究的问题,本文首次通过网络流量分析确定了限制工业物联网设备识别的关键知识缺口:模糊的指纹特征空间,对未知事物的有限泛化性以及稀缺的数据源。针对这些差距,对网络流量指纹识别、工业物联网设备识别和公共工业物联网数据集的现有方法进行了详细分析和总结。具体来说,网络流量指纹识别方法分为三个级别:包级、流级和业务级,并根据数据格式、分段单元和提取或生成技术对相关方法进行了检查。在工业物联网设备识别的背景下,使用基于规则的、基于传统机器学习的和基于深度学习的方法,对设备类型、模型和实例识别以及异常设备检测等任务进行了广泛的研究,重点是设备指纹和应用场景。此外,重点介绍了来自物联网、ICS和IIoT场景的主要公共数据集,以支持指纹识别和识别方法的发展。最后,提出了未来的研究方向,以指导该领域的新进展。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
IEEE Transactions on Industrial Informatics
IEEE Transactions on Industrial Informatics 工程技术-工程:工业
CiteScore
24.10
自引率
8.90%
发文量
1202
审稿时长
5.1 months
期刊介绍: The IEEE Transactions on Industrial Informatics is a multidisciplinary journal dedicated to publishing technical papers that connect theory with practical applications of informatics in industrial settings. It focuses on the utilization of information in intelligent, distributed, and agile industrial automation and control systems. The scope includes topics such as knowledge-based and AI-enhanced automation, intelligent computer control systems, flexible and collaborative manufacturing, industrial informatics in software-defined vehicles and robotics, computer vision, industrial cyber-physical and industrial IoT systems, real-time and networked embedded systems, security in industrial processes, industrial communications, systems interoperability, and human-machine interaction.
期刊最新文献
Predicting Cement Strength as Probability Density: Resolving Partial Observability and Sample Scarcity for Industrial Quality Control Semantically Guided Counterfactual Model for Multiclass Anomaly Detection Predicting Response Parameters of Ice-Covered Overhead Transmission Lines With Physics-Augmented Machine Learning DSFormer: Dual-Stream Transformers With Exogenous Variables for Electricity Price Forecasting Adaptive Platoon Tracking Control for Vehicles With Irregular Constraints: A Novel Disturbance Rejection Method
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1