Tongxin xuebao (Aug 2024)

Survey of industrial Internet traffic analysis technology

  • LIU Qixu,
  • XIAO Juxin,
  • TAN Yaokang,
  • WANG Chengchun,
  • HUANG Hao,
  • ZHANG Fangjiao,
  • YIN Jie,
  • LIU Yuling

Journal volume & issue
Vol. 45
pp. 221 – 237

Abstract

Read online

To gain an in-depth awareness of the application of traffic analysis technology in the industrial Internet, the differences between the industrial Internet and the traditional Internet through the five core traffic analysis processes were illustrated. By reviewing a large number of related papers, the application of six popular were summarized in the industrial Internet, such as traffic prediction, protocol identification and reverse engineering, industrial asset fingerprinting, intrusion detection, encrypted traffic identification and vulnerability mining. Depending on the nature of the task, traffic analysis technology was classified into two types of applications, such as service quality enhancement and security capability development, allowing to thoroughly explore the application scenarios of traffic analysis technology in the industrial Internet. Finally, the challenges associated with future traffic analysis applications in the industrial Internet were examined, as well as potential development possibilities.

Keywords