A New Intrusion Detection Method Based on Industrial Internet

被引:0
作者
Wu, Yuhong [1 ]
Hu, Xiangdong [2 ]
机构
[1] Chongqing Univ Posts & Telecommun, Coll Comp Sci & Technol, Chongqing, Peoples R China
[2] Chongqing Univ Posts & Telecommun, Coll Automat, Chongqing, Peoples R China
来源
JOURNAL OF INTERNET TECHNOLOGY | 2025年 / 26卷 / 01期
关键词
Security risks; Intrusion detection; Unbalanced data; Encryption mode; Secure e-commerce; NETWORK; TECHNOLOGIES; FEATURES; SYSTEMS;
D O I
10.70003/160792642025012601011
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of the Industrial Internet, the security risks of the Industrial Internet will soon be exposed. In view of the low accuracy of the existing intrusion detection algorithms, the difficulty in adapting to the industrial Internet networking mode, and the imbalance of massive data, this paper proposes a capsule- based method. The network intrusion detection method, this method first refers to the DRN structure, introduces the residual block as the main capsule layer to extract high-quality feature maps, then uses the dynamic routing algorithm to cluster the features, and uses the Adam algorithm to optimize the learning in backpropagation rate to make the detection model stable and fast. In terms of convergence, the detection accuracy rate in the simulation test using the gas pipeline data set in this paper reaches 99.28%, and it is more robust to massive unbalanced data. The experimental results show that this method can better meet the current industrial internet security needs.
引用
收藏
页码:123 / 135
页数:13
相关论文
共 25 条
[1]   Industrial Control Systems: Cyberattack trends and countermeasures [J].
Alladi, Tejasvi ;
Chamola, Vinay ;
Zeadally, Sherali .
COMPUTER COMMUNICATIONS, 2020, 155 :1-8
[2]   Embedding Encryption and Machine Learning Intrusion Prevention Systems on Programmable Logic Controllers [J].
Alves, Thiago ;
Das, Rishabh ;
Morris, Thomas .
IEEE EMBEDDED SYSTEMS LETTERS, 2018, 10 (03) :99-102
[3]   Optimisation of classification algorithm of associated data features of large-scale network system [J].
Cao, Yu .
INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2020, 13 (02) :55-60
[4]   Recurrent Neural Networks Based Wireless Network Intrusion Detection and Classification Model Construction and Optimization [J].
Chen Hongsong ;
Chen Jingjiu .
JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2019, 41 (06) :1427-1433
[5]   The expected contribution of Industry 4.0 technologies for industrial performance [J].
Dalenogare, Lucas Santos ;
Benitez, Guilherme Brittes ;
Ayala, Nestor Fabian ;
Frank, Alejandro German .
INTERNATIONAL JOURNAL OF PRODUCTION ECONOMICS, 2018, 204 :383-394
[6]   Hyperspectral Image Classification with Capsule Network Using Limited Training Samples [J].
Deng, Fei ;
Pu, Shengliang ;
Chen, Xuehong ;
Shi, Yusheng ;
Yuan, Ting ;
Pu, Shengyan .
SENSORS, 2018, 18 (09)
[7]   More is Less: A More Complicated Network with Less Inference Complexity [J].
Dong, Xuanyi ;
Huang, Junshi ;
Yang, Yi ;
Yan, Shuicheng .
30TH IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2017), 2017, :1895-1903
[8]   Deep Residual Learning for Image Recognition [J].
He, Kaiming ;
Zhang, Xiangyu ;
Ren, Shaoqing ;
Sun, Jian .
2016 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2016, :770-778
[9]   Real-Time Detection of False Data Injection Attacks in Smart Grid: A Deep Learning-Based Intelligent Mechanism [J].
He, Youbiao ;
Mendis, Gihan J. ;
Wei, Jin .
IEEE TRANSACTIONS ON SMART GRID, 2017, 8 (05) :2505-2516
[10]  
[江泽涛 Jiang Zetao], 2019, [电子学报, Acta Electronica Sinica], V47, P1538