Human-Object Relations and Security Control in Inference System for the User Intention

被引:0
作者
Park, Boseok [1 ]
Tang, Jiamei [2 ]
Kim, Sangwook [1 ]
机构
[1] Kyungpook Natl Univ, Sch Comp Sci & Engn, Daegu 41566, South Korea
[2] Shenzhen Polytech Xili, Dept Artificial Intelligence, Shenzhen 518055, Peoples R China
关键词
Internet of Things; Security; Behavioral sciences; Botnet; Authentication; Servers; Control systems; Event detection; Intrusion detection; Support vector machines; Event correlation; intrusion detection; network security; support vector machine;
D O I
10.1109/ACCESS.2023.3310217
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) networks are getting bigger and bigger. In most cases, all IT assets are connected to the network and various resources and services are provisioned proactively as needed. To achieve this, many smart objects are being developed in the field of intelligent devices. However, most of these objects can only enable their smart functionalities only after the user starts interacting with the object, which leads to an absence of intelligence between things. Bridging the gap between these entities to improve network productivity and improve network security is a challenge. Because the logs generated by IoT devices are vast and diverse, it is difficult to detect and defend against cyber-attacks with existing network security technologies. Existing cyber-attack detection systems cannot detect new attacks because they defend by defining known attack patterns as rules. This paper presents relations and security control in inference system to infer with which object a person wishes to interact by observing his behavior. Security control for services in this paper is important, and specialized. To achieve this goal, this inference problem is resolved into a problem of distinguishing, for each object, whether the IoT device has the intention to interact with it. It analyzes human behavior and detects whether there is a cyber-attack intention. Subsequently, for every object, a set of human-device relations, including Relative Distance, Relative Angle, Movement Speed, Approach Efficiency and Movement Efficiency, is extracted from the person's behavior. These relationships are used to determine whether a person wants to interact with a particular object using a Support Vector Machine (SVM) classifier. And new mechanisms are needed to shrink massive raw logs and detect new attack patterns. Thus, this paper suggests a method for securing a huge network supporting IoT services. The proposed inference systems detect unusual network patterns by calculating correlations between events based on graphs and network measurements. We model ensemble of events based on log graphs interconnected between network devices and IoT gateways. We implement and evaluate an algorithm that detects new attack patterns by estimating the attack probability by clustering the event ensemble in real time. Finally, for the effectiveness of the proposed relations, the experimental application of a real dataset is evaluated, with encouraging results. Using the proposed human-object relations, it is possible to sense users' interaction intentions in advance and thus to proactively provide user-adaptive services based on safety.
引用
收藏
页码:95368 / 95380
页数:13
相关论文
共 29 条
  • [1] Candiotti JJ, 2022, IEEE T HUM-MACH SYST, V52, P149, DOI [10.1109/THMS.2021.3131672, 10.1109/thms.2021.3131672]
  • [2] Ambiguousness-Aware State Evolution for Action Prediction
    Chen, Lei
    Lu, Jiwen
    Song, Zhanjie
    Zhou, Jie
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2022, 32 (09) : 6058 - 6072
  • [3] Chen Y, 2019, 2019 IEEE 6TH INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND APPLICATIONS (ICIEA), P861, DOI 10.1109/IEA.2019.8714814
  • [4] Collaborative Intrusion Detection System for SDVN: A Fairness Federated Deep Learning Approach
    Cui, Jie
    Sun, Hu
    Zhong, Hong
    Zhang, Jing
    Wei, Lu
    Bolodurina, Irina
    He, Debiao
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2023, 34 (09) : 2512 - 2528
  • [5] Eom Y., 2019, 2019 International Conference on Technologies and Applications of Artificial Intelligence, P1, DOI DOI 10.1109/TAAI48200.2019.8959824
  • [6] Gupta A. K., 2019, P 4 INT C INT THINGS, P1, DOI 10.1109/IoTSIU.2019.8777342
  • [7] Detection of Real-Time Malicious Intrusions and Attacks in IoT Empowered Cybersecurity Infrastructures
    Kandhro, Irfan Ali
    Alanazi, Sultan M. M.
    Ali, Fayyaz
    Kehar, Asadullah
    Fatima, Kanwal
    Uddin, Mueen
    Karuppayah, Shankar
    [J]. IEEE ACCESS, 2023, 11 : 9136 - 9148
  • [8] Li SY, 2021, CHIN CONTR CONF, P6755, DOI 10.23919/CCC52363.2021.9549244
  • [9] A comparison of human skeleton extractors for real-time human-robot interaction
    Li, Wanchen
    Passama, Robin
    Bonnet, Vincent
    Cherubini, Andrea
    [J]. 2023 IEEE INTERNATIONAL CONFERENCE ON ADVANCED ROBOTICS AND ITS SOCIAL IMPACTS, ARSO, 2023, : 159 - 165
  • [10] Lin LN, 2019, INT CONF COMP SCI ED, P488, DOI [10.1109/iccse.2019.8845354, 10.1109/ICCSE.2019.8845354]