2022
DOI: 10.1109/jiot.2021.3131981
|View full text |Cite
|
Sign up to set email alerts
|

Malware Traffic Classification Using Domain Adaptation and Ladder Network for Secure Industrial Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 36 publications
(14 citation statements)
references
References 40 publications
0
14
0
Order By: Relevance
“…Hu et al, [36] proposed a deep subdomain adaptation network with attention mechanism (DSAN-AT), which utilised the local MMD to boost the prediction accuracy and an attention mechanism to prevent overly long convergence time. To circumvent the labour-intensive dataset collection process, Ning et al, [37] proposed a knowledge transfer (KT) ConvLaddernet to work under a semi-supervised setting, i.e., transfer knowledge from a small-scale source domain to facilitate intrusion detection of the target domain. Although previous DA-based methods have been applied to perform intrusion detection, they failed to jointly consider the implicit categorical and explicit distance semantics during knowledge transfer, which may hinder their effectiveness.…”
Section: Domain Adaptation-based Intrusion Detectionmentioning
confidence: 99%
See 2 more Smart Citations
“…Hu et al, [36] proposed a deep subdomain adaptation network with attention mechanism (DSAN-AT), which utilised the local MMD to boost the prediction accuracy and an attention mechanism to prevent overly long convergence time. To circumvent the labour-intensive dataset collection process, Ning et al, [37] proposed a knowledge transfer (KT) ConvLaddernet to work under a semi-supervised setting, i.e., transfer knowledge from a small-scale source domain to facilitate intrusion detection of the target domain. Although previous DA-based methods have been applied to perform intrusion detection, they failed to jointly consider the implicit categorical and explicit distance semantics during knowledge transfer, which may hinder their effectiveness.…”
Section: Domain Adaptation-based Intrusion Detectionmentioning
confidence: 99%
“…Note that when used as source II domain, the amount of data is 1/6 − 1/2 of the amount of source NI data to reflect the reality that IoT intrusion data is scarcer than network intrusion data. Besides, under the semi-supervised setting, we follow [1], [34], [37] to vary the n T L : n T U ratio among 1 : 2, 1 : 10 and 1 : 50, i.e., the amount of unlabelled target II data is much higher than the amount of labelled target II data. Each record in the dataset is represented using 46 features.…”
Section: A Dataset and Setupmentioning
confidence: 99%
See 1 more Smart Citation
“…Especially after the emergence of deep learning, it no longer relies on manual extraction of traffic characteristics, which saves a lot of manpower and material resources and has strong scalability. e traffic recognition technology based on deep learning will be the focus and mainstream of future research, such as [23,24]. e development of adversarial machine learning provides opportunities for traffic obfuscation technology.…”
Section: Related Workmentioning
confidence: 99%
“…By achieving domaininvariant alignment, the transferred intrusion knowledge can facilitate more accurate IID. For instance, Ning [5] presented a Laddernet-based DA solution to improve the intrusion classification accuracy and secure the industrial IoT infrastructures. Hu [6] studied a deep subdomain adaptation network with attention mechanism and focused on distribution alignment between domains via local maximum mean discrepancy.…”
Section: Introductionmentioning
confidence: 99%