Intelligent Detection Method for Malicious Attacks in Enterprise Internet of Things Based on Graph Neural Network

被引:0
作者
Liu W. [1 ]
Liu X. [1 ,2 ]
机构
[1] Shenzhen Power Supply Bureau Co., Ltd.
[2] School of Electrical and Electronic Engineering, North China Electric Power University, Beijing
关键词
Enterprise IoT; Feature gradient; Graph neural network; Intelligent detection; Malicious attack; Network attack;
D O I
10.25103/jestr.165.18
中图分类号
学科分类号
摘要
With the continuous development of Internet of Things (IoT) technology and the widespread application of IoT by enterprises, enterprise IoT is facing increasingly complex and frequent malicious attack threats. To effectively detect malicious attacks in enterprise IoT and timely take corresponding security protection measures, an intelligent detection method was proposed for malicious attacks in enterprise IoT based on graph neural networks. Pre-processing enterprise IoT data, extracting data features, analyzing data packet transmission characteristics, and employing a graph neural network to extract time series features were involved in this method. To mitigate feature gradient disappearance, additional connections were incorporated. Data containing interactive nodes was filtered using these features, and a three-layer model was established for classifying the data, thus facilitating intelligent detection of malicious attacks. Experimental results show that this method can accurately describe the changing characteristics of malicious attacks on enterprise IoT and overcome the shortcomings of current malicious attacks on enterprise IoT. It achieves a 100% accuracy rate on the KDD (Knowledge Discovery and Data Mining) Cup 1999 dataset and enterprise IoT and is consistent with the imported data information. The average malicious node detection rate of this method is 97.26% on the two datasets. The method outperforms node-centered control algorithms, mutual information-based methods, and GWB-LSSVM joint methods. The proposed intelligent detection method exhibits strong feasibility, high accuracy, and important practical application value. © 2023 School of Science, IHU. All rights reserved.
引用
收藏
页码:150 / 155
页数:5
相关论文
共 50 条
[31]   An Adaptive Sampling Strategy for Federal Graph Neural Networks in Internet of Things [J].
Wang, Tingqi ;
Zheng, Xu ;
Yang, Liyun ;
Xiang, Rong .
2023 IEEE INTERNATIONAL PERFORMANCE, COMPUTING, AND COMMUNICATIONS CONFERENCE, IPCCC, 2023,
[32]   Network Flow Based IoT Anomaly Detection Using Graph Neural Network [J].
Wei, Chongbo ;
Xie, Gaogang ;
Diao, Zulong .
KNOWLEDGE SCIENCE, ENGINEERING AND MANAGEMENT, PT II, KSEM 2023, 2023, 14118 :432-445
[33]   Missile temporal planning method based on graph neural network [J].
Chen, Kai ;
Zhang, Deping .
Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2025, 47 (03) :862-870
[34]   An Academic Text Recommendation Method Based on Graph Neural Network [J].
Yu, Jie ;
Pan, Chenle ;
Li, Yaliu ;
Wang, Junwei .
INFORMATION, 2021, 12 (04)
[35]   Membership Inference Attacks Against Robust Graph Neural Network [J].
Liu, Zhengyang ;
Zhang, Xiaoyu ;
Chen, Chenyang ;
Lin, Shen ;
Li, Jingjin .
CYBERSPACE SAFETY AND SECURITY, CSS 2022, 2022, 13547 :259-273
[36]   ACGVD: Vulnerability Detection Based on Comprehensive Graph via Graph Neural Network with Attention [J].
Li, Min ;
Li, Chunfang ;
Li, Shuailou ;
Wu, Yanna ;
Zhang, Boyang ;
Wen, Yu .
INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2021), PT I, 2021, 12918 :243-259
[37]   Fault Location Method of Distribution Network based on Improved Graph Neural Network [J].
Wei, Tingke ;
Zhang, Huanjiao ;
Fan, Min ;
Sun, Jingwen ;
Wang, Xiaozhong .
2024 THE 9TH INTERNATIONAL CONFERENCE ON POWER AND RENEWABLE ENERGY, ICPRE, 2024, :758-763
[38]   A graph neural network-based data cleaning method to prevent intelligent fault diagnosis from data contamination [J].
Wang, Shuhui ;
Lei, Yaguo ;
Yang, Bin ;
Li, Xiang ;
Shu, Yue ;
Lu, Na .
ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2023, 126
[39]   BinVuGAL: Binary vulnerability detection method based on graph neural network combined with assembly language model [J].
Song, Zhihui ;
Xu, Jinchen .
PROCEEDINGS OF 2024 3RD INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, NETWORK SECURITY AND COMMUNICATION TECHNOLOGY, CNSCT 2024, 2024, :159-163
[40]   SNOW: An Effective Smart Contract Reentrancy Vulnerability Detection Method Based on Joint Feature Graph and Hybrid Graph Neural Network [J].
Lian, Wenjuan ;
Zhang, Xinze ;
Bao, Zikang ;
Jia, Bin .
SOFTWARE-PRACTICE & EXPERIENCE, 2025, 55 (08) :1361-1376