An Unsupervised Learning-Based Network Threat Situation Assessment Model for Internet of Things

作者: Hongyu Yang , Renyun Zeng , Fengyan Wang , Guangquan Xu , Jiyong Zhang

DOI: 10.1155/2020/6656066

关键词:

摘要: With the wide application of network technology, Internet Things (IoT) systems are facing increasingly serious situation threats; threat assessment becomes an important approach to solve these problems. Aiming at traditional methods based on data category tag that has high modeling cost and low efficiency in assessment, this paper proposes a model unsupervised learning for IoT. Firstly, we combine encoder variational autoencoder (VAE) discriminator generative adversarial networks (GAN) form V-G network. Then, obtain reconstruction error each layer by training collection with normal traffic. Besides, conduct 3-layer output calculate abnormal threshold training. Moreover, carry out group testing test dataset containing traffic probability group. Finally, value (TSV) according impact. The simulation results show that, compared other methods, proposed method can evaluate overall security more intuitively stronger characterization ability threats.

参考文章(11)
Yu-Beng Leau, Selvakumar Manickam, Yung-Wey Chong, Network Security Situation Assessment: A Review and Discussion Springer, Berlin, Heidelberg. pp. 407- 414 ,(2015) , 10.1007/978-3-662-46578-3_48
Peter Mell, Karen Scarfone, Sasha Romanosky, Common Vulnerability Scoring System ieee symposium on security and privacy. ,vol. 4, pp. 85- 89 ,(2006) , 10.1109/MSP.2006.145
Fadele Ayotunde Alaba, Mazliza Othman, Ibrahim Abaker Targio Hashem, Faiz Alotaibi, Internet of Things security Journal of Network and Computer Applications. ,vol. 88, pp. 10- 28 ,(2017) , 10.1016/J.JNCA.2017.04.002
Huan Wang, Zhanfang Chen, Xin Feng, Xiaoqiang Di, Dan Liu, Jianping Zhao, Xin Sui, Research on Network Security Situation Assessment and Quantification Method Based on Analytic Hierarchy Process Wireless Personal Communications. ,vol. 102, pp. 1401- 1420 ,(2018) , 10.1007/S11277-017-5202-3
Wei Feng, Yuqin Wu, Yexian Fan, A new method for the prediction of network security situations based on recurrent neural network with gated recurrent unit International Journal of Intelligent Computing and Cybernetics. ,vol. 11, pp. 511- 525 ,(2018) , 10.1108/IJICC-06-2017-0066
Zheli Liu, Bo Li, Yanyu Huang, Jin Li, Yang Xiang, Witold Pedrycz, NewMCOS: Towards a Practical Multi-Cloud Oblivious Storage Scheme IEEE Transactions on Knowledge and Data Engineering. ,vol. 32, pp. 714- 727 ,(2020) , 10.1109/TKDE.2019.2891581
Jin Li, Yanyu Huang, Yu Wei, Siyi Lv, Zheli Liu, Changyu Dong, Wenjing Lou, Searchable Symmetric Encryption with Forward Search Privacy IEEE Transactions on Dependable and Secure Computing. ,vol. 18, pp. 460- 474 ,(2021) , 10.1109/TDSC.2019.2894411
Ruchi Vishwakarma, Ankit Kumar Jain, A survey of DDoS attacking techniques and defence mechanisms in the IoT network Telecommunication Systems. ,vol. 73, pp. 3- 25 ,(2020) , 10.1007/S11235-019-00599-Z
Yanyu Huang, Bo Li, Zheli Liu, Jin Li, Siu-Ming Yiu, Thar Baker, Brij B. Gupta, ThinORAM: Towards Practical Oblivious Data Access in Fog Computing Environment IEEE Transactions on Services Computing. ,vol. 13, pp. 602- 612 ,(2020) , 10.1109/TSC.2019.2962110
Chen Zhigang, Wen Zhicheng, Tang Jun, Assessing network security situation quantitatively based on information fusion Journal of Beijing University of Aeronautics and Astronautics. ,vol. 42, pp. 1593- ,(2016) , 10.13700/J.BH.1001-5965.2015.0561