Application of network security penetration technology in power internet of things security vulnerability detection

被引:4
|
作者
Chen, Ze [1 ]
Zuo, Xiaojun [1 ]
Dong, Na [1 ]
Hou, Botao [1 ]
机构
[1] State Grid Hebei Elect Power Res Inst, Shijiazhuang 050021, Hebei, Peoples R China
关键词
FRAMEWORK;
D O I
10.1002/ett.3859
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The emergence of network penetration attacks makes network security problems more and more prominent. To better detect network penetration attacks, this article first proposes an attack detection method based on ant colony classification rules mining algorithm based on swarm intelligence theory. Classification rules perform pattern matching to detect attack behavior. Second, the quantitative problem in the evaluation mechanism of power internet security vulnerability is analyzed. The addition and deletion of power internet of things (IoT) security assessment elements introduces a probabilistic computing model, improves the vulnerability assessment mechanism of power object networks, and solves the problem of power object network security and quantitative computing. Finally, after performing a series of preprocessing on the dataset, using the above method to find the classification rule or classification center, respectively, perform pattern matching or similarity calculation, and finally obtain the attack detection result. A series of evaluation functions are established in the experiment, and the experimental results are compared with other related algorithms. The results show that the method can effectively detect network penetration attacks and IoT security vulnerabilities, and the effectiveness of attack detection methods is greatly improved.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] Application of intelligent Internet of Things technology in the security monitoring system of power Internet of Things network
    Lei Song
    Haibo Lan
    Jin Du
    Kai Wang
    Wei Kang
    Discover Internet of Things, 5 (1):
  • [2] Internet of Things Computer Network Security and Remote Control Technology Application
    Wang, Aihua
    2020 5TH INTERNATIONAL CONFERENCE ON MECHANICAL, CONTROL AND COMPUTER ENGINEERING (ICMCCE 2020), 2020, : 1814 - 1817
  • [3] Research on Application of Information Security Protection Technology in Power Internet of Things
    Li, Dong
    Chang, Yingxian
    Yu, Hao
    Dong, Qingquan
    Chen, Yuhang
    ADVANCED INTELLIGENT TECHNOLOGIES FOR INDUSTRY, 2022, 285 : 491 - 498
  • [4] Cloud storage and security technology in the application of the Internet things
    Liang, Xiaoyang
    Zhang, Lin
    MODERN TENDENCIES IN ENGINEERING SCIENCES, 2014, 533 : 460 - 465
  • [5] Application of Internet of Things Technology in Computer Network Security and Remote-Control Analysis
    Huang, Shouning
    INTERNATIONAL JOURNAL OF WEB SERVICES RESEARCH, 2024, 21 (01)
  • [6] Research on Security Protection Technology System of Power internet of things
    Gao, Peng
    Yang, Ruxia
    Shi, Congcong
    Zhang, Xiaojian
    PROCEEDINGS OF 2019 IEEE 8TH JOINT INTERNATIONAL INFORMATION TECHNOLOGY AND ARTIFICIAL INTELLIGENCE CONFERENCE (ITAIC 2019), 2019, : 1772 - 1776
  • [7] Research on the Security Technology of the Internet of Things in Nuclear Power Plant
    Liang, Hui-Hui
    Gao, Xin-Xin
    Ye, Wang-Ping
    Liu, Wei
    NUCLEAR POWER PLANTS: INNOVATIVE TECHNOLOGIES FOR INSTRUMENTATION AND CONTROL SYSTEMS (ISNPP 2019), 2020, 595 : 556 - 562
  • [8] The Research of Security Technology in the Internet of Things
    Sun, Xiangyu
    Wang, Changguang
    ADVANCES IN COMPUTER SCIENCE, INTELLIGENT SYSTEM AND ENVIRONMENT, VOL 2, 2011, 105 : 113 - 119
  • [9] Automated Network Intrusion Detection for Internet of Things: Security Enhancements
    Maghrabi, Louai A.
    IEEE ACCESS, 2024, 12 : 30839 - 30851
  • [10] A Novel Intrusion Detection System for Internet of Things Network Security
    Bediya, Arun Kumar
    Kumar, Rajendra
    JOURNAL OF INFORMATION TECHNOLOGY RESEARCH, 2021, 14 (03) : 20 - 37