Intelligent Detection Method for Malicious Attacks in Enterprise Internet of Things Based on Graph Neural Network

被引:0
作者
Liu W. [1 ]
Liu X. [1 ,2 ]
机构
[1] Shenzhen Power Supply Bureau Co., Ltd.
[2] School of Electrical and Electronic Engineering, North China Electric Power University, Beijing
关键词
Enterprise IoT; Feature gradient; Graph neural network; Intelligent detection; Malicious attack; Network attack;
D O I
10.25103/jestr.165.18
中图分类号
学科分类号
摘要
With the continuous development of Internet of Things (IoT) technology and the widespread application of IoT by enterprises, enterprise IoT is facing increasingly complex and frequent malicious attack threats. To effectively detect malicious attacks in enterprise IoT and timely take corresponding security protection measures, an intelligent detection method was proposed for malicious attacks in enterprise IoT based on graph neural networks. Pre-processing enterprise IoT data, extracting data features, analyzing data packet transmission characteristics, and employing a graph neural network to extract time series features were involved in this method. To mitigate feature gradient disappearance, additional connections were incorporated. Data containing interactive nodes was filtered using these features, and a three-layer model was established for classifying the data, thus facilitating intelligent detection of malicious attacks. Experimental results show that this method can accurately describe the changing characteristics of malicious attacks on enterprise IoT and overcome the shortcomings of current malicious attacks on enterprise IoT. It achieves a 100% accuracy rate on the KDD (Knowledge Discovery and Data Mining) Cup 1999 dataset and enterprise IoT and is consistent with the imported data information. The average malicious node detection rate of this method is 97.26% on the two datasets. The method outperforms node-centered control algorithms, mutual information-based methods, and GWB-LSSVM joint methods. The proposed intelligent detection method exhibits strong feasibility, high accuracy, and important practical application value. © 2023 School of Science, IHU. All rights reserved.
引用
收藏
页码:150 / 155
页数:5
相关论文
共 50 条
[1]   Random Feature Graph Neural Network for Intrusion Detection in Internet of Things [J].
Luo, Guoyu ;
Wang, Xueshun ;
Dai, Jinyou .
Computer Engineering and Applications, 2024, 60 (21) :264-273
[2]   An Intelligent Robustness Optimization Method for Internet of Things Using Graph Neural Networks [J].
Peng, Ya-Bin ;
Liu, Cai-Xia ;
Liu, Shu-Xin ;
Wang, Kai .
2021 THE 7TH INTERNATIONAL CONFERENCE ON COMMUNICATION AND INFORMATION PROCESSING, ICCIP 2021, 2021, :171-175
[3]   A Network Attack Detection Method Using SDA and Deep Neural Network Based on Internet of Things [J].
Jingwei Li ;
Bo Sun .
International Journal of Wireless Information Networks, 2020, 27 :209-214
[4]   A Network Attack Detection Method Using SDA and Deep Neural Network Based on Internet of Things [J].
Li, Jingwei ;
Sun, Bo .
INTERNATIONAL JOURNAL OF WIRELESS INFORMATION NETWORKS, 2020, 27 (02) :209-214
[5]   A Method for Intelligent Road Network Selection Based on Graph Neural Network [J].
Guo, Xuan ;
Liu, Junnan ;
Wu, Fang ;
Qian, Haizhong .
ISPRS INTERNATIONAL JOURNAL OF GEO-INFORMATION, 2023, 12 (08)
[6]   Systematic Review of Graph Neural Network for Malicious Attack Detection [J].
Alshehri, Sarah Mohammed ;
Sharaf, Sanaa Abdullah ;
Molla, Rania Abdullrahman .
INFORMATION, 2025, 16 (06)
[7]   Intrusion Detection of Industrial Internet-of-Things Based on Reconstructed Graph Neural Networks [J].
Zhang, Yichi ;
Yang, Chunhua ;
Huang, Keke ;
Li, Yonggang .
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2023, 10 (05) :2894-2905
[8]   MLTracer: Malicious Logins Detection System via Graph Neural Network [J].
Liu, Fucheng ;
Wen, Yu ;
Wu, Yanna ;
Liang, Shuangshuang ;
Jiang, Xihe ;
Meng, Dan .
2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, :715-726
[9]   JS']JStrong: Malicious Java']JavaScript detection based on code semantic representation and graph neural network [J].
Fang, Yong ;
Huang, Chaoyi ;
Zeng, Minchuan ;
Zhao, Zhiying ;
Huang, Cheng .
COMPUTERS & SECURITY, 2022, 118
[10]   Routing Attacks Detection in 6LoWPAN-Based Internet of Things [J].
Alazab, Ammar ;
Khraisat, Ansam ;
Singh, Sarabjot ;
Bevinakoppa, Savitri ;
Mahdi, Osama A. .
ELECTRONICS, 2023, 12 (06)