Journal of Jilin University(Engineering and Technology Edition) ›› 2023, Vol. 53 ›› Issue (7): 2121-2126.doi: 10.13229/j.cnki.jdxbgxb.20220370

Previous Articles    

Design of automatic identification algorithm for Internet of Things security situation based on deep neural network

Peng-ju LIU1,2()   

  1. 1.School of Cyber Science and Engineering,Wuhan University,Wuhan 430072,China
    2.Key Laboratory of Aerospace Information Security and Trusted Computing of Ministry of Education,Wuhan University,Wuhan 430072,China
  • Received:2022-04-21 Online:2023-07-01 Published:2023-07-20

Abstract:

The unknown attack threat of the network will affect the security situation of the Internet of Things. In order to improve the identification effect, an automatic identification algorithm of the security situation of the Internet of Things based on deep neural network is proposed. Analyze the security threats of the Internet of Things through Trojan horse and DDoS attacks, obtain the security situation elements of the Internet of Things, extract the security situation characteristics of the Internet of Things by establishing the security state distribution model of the Internet of Things invaded by viruses, combine the deep neural network with the deep stack editor, train the extracted security situation characteristics, and use the final training results to determine the security situation performance of the Internet of Things, Complete the automatic identification of Internet of Things security situation and realize the design of automatic identification algorithm of Internet of Things security situation. The experimental results show that the algorithm has high accuracy and strong practicability through the comparison test of recognition effect, recall test, F1 value test and recognition running time test.

Key words: deep neural network, Internet of Things, security situation, automatic identification

CLC Number: 

  • TP393

Fig.1

Hierarchical IoT security situation element acquisition architecture"

Fig.2

Training process based on a deep neural network"

Fig.3

Identification accuracy and comparison results"

Table 1

Comparison test of recall rate of three methods"

物联网安全态势

数据集/个

不同方法的召回率/%
算法1算法2算法3
20098.993.293.6
40097.592.992.7
60097.491.691.5
80096.990.590.6
100096.589.389.7
120095.385.488.6

Fig.4

F1 value comparison test"

Fig.5

Identifying runtime tests"

1 边寒, 陈小红, 金芝, 等. 基于环境建模的物联网系统TAP规则生成方法[J]. 软件学报, 2021, 32(4): 934-952.
Bian Han, Chen Xiao-hong, Jin Zhi, et al. Approach to generating TAP rules in IoT systems based on environment modeling[J]. Journal of Software, 2021, 32(4): 934-952.
2 杨婷婷, 李志一, 赵冬泉.基于物联网大数据的城市降雨径流控制率分析[J]. 水电能源科学, 2020, 38(5): 15-17, 210.
Yang Ting-ting, Li Zhi-yi, Zhao Dong-quan. Analysis of urban rainfall and runoff control rate based on IoT big data[J]. Water Resources and Power, 2020, 38(5): 15-17, 210.
3 张帅钦, 张荣杰, 温旭东. 基于一维像选择双谱的神经网络识别算法[J]. 现代雷达, 2020, 42(4): 46-49.
Zhang Shuai-qin, Zhang Rong-jie, Wen Xu-dong. A neural network recognition algorithm based on one-dimensional image selection bispectrum[J]. Modern Radar, 2020, 42(4): 46-49.
4 唐作栋, 龚晓峰, 雒瑞森.一种小波特征与深度神经网络结合的信号制式识别算法[J]. 计算机工程与科学, 2020, 42(5): 902-909.
Tang Zuo-dong, Gong Xiao-feng, Luo Rui-sen. A signal system recognition algorithm combining wavelet features and deep neural networks[J]. Computer Engineering and Science, 2020, 42(5): 902-909.
5 苟泽中, 许华, 郑万泽, 等.基于半监督联合神经网络的调制识别算法[J]. 信号处理, 2020, 36(2): 168-176.
Gou Ze-zhong, Xu Hua, Zheng Wan-ze, et al. Semi-supervised joint neural network based recognition algorithm of modulation signal[J]. Journal of Signal Processing, 2020, 36(2): 168-176.
6 丑义凡, 易波, 王兴伟, 等. IPv6网络中基于MF-DL的DDoS攻击快速防御机制[J]. 计算机学报, 2021, 44(10): 2047-2060.
Yi-fan Chou, Yi Bo, Wang Xing-wei, et al. A rapid defense mechanism based on MF-DL for DDoS attack in IPv6 networks[J]. Chinese Journal of Computers, 2021, 44(10): 2047-2060.
7 张欣, 朱江.面向样本不平衡的网络安全态势要素获取[J]. 计算机工程与应用, 2022, 58(1): 134-142.
Zhang Xin, Zhu Jiang. Network security situation element acquisition for sample imbalance[J]. Computer Engineering and Applications, 2022, 58(1): 134-142.
8 牛祥.基于门限联合判别的同质网络入侵检测仿真[J]. 计算机仿真, 2020, 37(3): 309-313.
Niu Xiang. Simulation of homogeneous network intrusion detection based on threshold joint discrimination[J]. Computer Simulation, 2020, 37(3): 309-313.
9 景惠甜, 韩丽, 高志宇. 基于卷积神经网络特征提取的风电功率爬坡预测[J]. 电力系统自动化, 2021, 45(4): 98-105.
Jing Hui-tian, Han Li, Gao Zhi-yu. Wind power ramp prediction based on feature extraction of convolutional neural network[J]. Automation of Electric Power Systems, 2021, 45(4): 98-105.
10 曲岳晗, 赵洪山, 马利波, 等. 多深度神经网络综合的电力变压器故障识别方法[J]. 中国电机工程学报, 2021, 41(23): 8223-8231.
Qu Yue-han, Zhao Hong-shan, Ma Li-bo, et al. Multi-depth neural network synthesis method for power transformer fault identification[J]. Proceedings of the CSEE, 2021, 41(23): 8223-8231.
[1] Xian-min SONG,Shu-tian YANG,Ming-xin LIU,Zhi-hui LI. Fluctuation characteristics and prediction method of bus travel time between stations [J]. Journal of Jilin University(Engineering and Technology Edition), 2022, 52(8): 1792-1799.
[2] Dong-ming SUN,Liang HU,Yong-heng XING,Feng WANG. Text fusion based internet of things service recommendation for trigger⁃action programming pattern [J]. Journal of Jilin University(Engineering and Technology Edition), 2021, 51(6): 2182-2189.
[3] Hong-song CHEN,Jing-jiu CHEN. Statistical based distributed denial of service attack detection research in internet of things [J]. Journal of Jilin University(Engineering and Technology Edition), 2020, 50(5): 1894-1904.
[4] FU Wen-bo, ZHANG Jie, CHEN Yong-le. Network topology discovery algorithm against routing spoofing attack in Internet of things [J]. 吉林大学学报(工学版), 2018, 48(4): 1231-1236.
[5] HU Guan-yu, QIAO Pei-li. Chaos covariance matrix adaptation evolution strategy optimization algorithm [J]. 吉林大学学报(工学版), 2017, 47(3): 937-943.
[6] HU Guan-yu, QIAO Pei-li. High dimensional differential evolutionary algorithm based on cloud population for network security prediction [J]. 吉林大学学报(工学版), 2016, 46(2): 568-577.
[7] LI Di-fei, TIAN Di, HU Xiong-wei. Standard literature language model based on deep learning [J]. 吉林大学学报(工学版), 2015, 45(2): 596-599.
[8] LIU Xiao-wu, WANG Hui-qiang, LYU Hong-wu, AN Shu-zhao. Quantitative awareness of network security situation based on fusion [J]. 吉林大学学报(工学版), 2013, 43(06): 1650-1657.
[9] LYU Chao, LIU Shuang, WANG Shi-ming. Integration framework of smart grid management service system [J]. 吉林大学学报(工学版), 2012, 42(增刊1): 246-250.
[10] TIAN Jing-jing, LI Shi-wu, SU Jian, WANG Lin-hong, SUN Wen-cai, CHEN Lu. Dynamic monitoring and early-warning system for overload of truck based on displacement sensor [J]. , 2012, (06): 1475-1480.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!