Survey of industrial Internet traffic analysis technology

To gain an in-depth awareness of the application of traffic analysis technology in the industrial Internet, the differences between the industrial Internet and the traditional Internet through the five core traffic analysis processes were illustrated. By reviewing a large number of related papers, t...

Full description

Saved in:
Bibliographic Details
Main Authors: LIU Qixu, XIAO Juxin, TAN Yaokang, WANG Chengchun, HUANG Hao, ZHANG Fangjiao, YIN Jie, LIU Yuling
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2024-08-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2024145/
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:To gain an in-depth awareness of the application of traffic analysis technology in the industrial Internet, the differences between the industrial Internet and the traditional Internet through the five core traffic analysis processes were illustrated. By reviewing a large number of related papers, the application of six popular were summarized in the industrial Internet, such as traffic prediction, protocol identification and reverse engineering, industrial asset fingerprinting, intrusion detection, encrypted traffic identification and vulnerability mining. Depending on the nature of the task, traffic analysis technology was classified into two types of applications, such as service quality enhancement and security capability development, allowing to thoroughly explore the application scenarios of traffic analysis technology in the industrial Internet. Finally, the challenges associated with future traffic analysis applications in the industrial Internet were examined, as well as potential development possibilities.
ISSN:1000-436X