Ji Il Hwan, Lee Ju Hyeon, Kang Min Ji, Park Woo Jin, Jeon Seung Ho, Seo Jung Taek
Department of Information Security, Gachon University, Seongnam-si 1342, Republic of Korea.
Department of Computer Engineering (Smart Security), Gachon University, Seongnam-si 1342, Republic of Korea.
Sensors (Basel). 2024 Jan 30;24(3):898. doi: 10.3390/s24030898.
As cyber-attacks increase in unencrypted communication environments such as the traditional Internet, protected communication channels based on cryptographic protocols, such as transport layer security (TLS), have been introduced to the Internet. Accordingly, attackers have been carrying out cyber-attacks by hiding themselves in protected communication channels. However, the nature of channels protected by cryptographic protocols makes it difficult to distinguish between normal and malicious network traffic behaviors. This means that traditional anomaly detection models with features from packets extracted a deep packet inspection (DPI) have been neutralized. Recently, studies on anomaly detection using artificial intelligence (AI) and statistical characteristics of traffic have been proposed as an alternative. In this review, we provide a systematic review for AI-based anomaly detection techniques over encrypted traffic. We set several research questions on the review topic and collected research according to eligibility criteria. Through the screening process and quality assessment, 30 research articles were selected with high suitability to be included in the review from the collected literature. We reviewed the selected research in terms of dataset, feature extraction, feature selection, preprocessing, anomaly detection algorithm, and performance indicators. As a result of the literature review, it was confirmed that various techniques used for AI-based anomaly detection over encrypted traffic were used. Some techniques are similar to those used for AI-based anomaly detection over unencrypted traffic, but some technologies are different from those used for unencrypted traffic.
随着传统互联网等未加密通信环境中网络攻击的增加,基于加密协议(如传输层安全协议(TLS))的受保护通信通道已被引入互联网。相应地,攻击者一直在通过隐藏在受保护的通信通道中来实施网络攻击。然而,由加密协议保护的通道的性质使得区分正常和恶意网络流量行为变得困难。这意味着具有从深度包检测(DPI)提取的数据包特征的传统异常检测模型已失效。最近,利用人工智能(AI)和流量统计特征进行异常检测的研究被提出来作为一种替代方法。在本综述中,我们对基于人工智能的加密流量异常检测技术进行了系统综述。我们针对综述主题设置了几个研究问题,并根据入选标准收集了相关研究。通过筛选过程和质量评估,从收集的文献中选出了30篇高度适合纳入综述的研究文章。我们从数据集、特征提取、特征选择、预处理、异常检测算法和性能指标等方面对所选研究进行了综述。文献综述的结果证实,在基于人工智能的加密流量异常检测中使用了各种技术。一些技术与基于人工智能的未加密流量异常检测中使用的技术相似,但一些技术与未加密流量中使用的技术不同。