Application of network security penetration technology in power internet of things security vulnerability detection

被引:4
作者
Chen, Ze [1 ]
Zuo, Xiaojun [1 ]
Dong, Na [1 ]
Hou, Botao [1 ]
机构
[1] State Grid Hebei Elect Power Res Inst, Shijiazhuang 050021, Hebei, Peoples R China
关键词
FRAMEWORK;
D O I
10.1002/ett.3859
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The emergence of network penetration attacks makes network security problems more and more prominent. To better detect network penetration attacks, this article first proposes an attack detection method based on ant colony classification rules mining algorithm based on swarm intelligence theory. Classification rules perform pattern matching to detect attack behavior. Second, the quantitative problem in the evaluation mechanism of power internet security vulnerability is analyzed. The addition and deletion of power internet of things (IoT) security assessment elements introduces a probabilistic computing model, improves the vulnerability assessment mechanism of power object networks, and solves the problem of power object network security and quantitative computing. Finally, after performing a series of preprocessing on the dataset, using the above method to find the classification rule or classification center, respectively, perform pattern matching or similarity calculation, and finally obtain the attack detection result. A series of evaluation functions are established in the experiment, and the experimental results are compared with other related algorithms. The results show that the method can effectively detect network penetration attacks and IoT security vulnerabilities, and the effectiveness of attack detection methods is greatly improved.
引用
收藏
页数:13
相关论文
共 50 条
  • [21] Security in Internet of Things: Challenges, Solutions and Future Directions
    Kumar, Sathish Alampalayam
    Vealey, Tyler
    Srivastava, Harshit
    PROCEEDINGS OF THE 49TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS 2016), 2016, : 5772 - 5781
  • [22] A Model-based Security Toolkit for the Internet of Things
    Neisse, Ricardo
    Fovino, Igor Nai
    Baldini, Gianmarco
    Stavroulaki, Vera
    Vlacheas, Panagiotis
    Giaffreda, Raffaele
    2014 NINTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2015, : 78 - 87
  • [23] Leveraging Blockchain Technology for Ensuring Security and Privacy Aspects in Internet of Things: A Systematic Literature Review
    Zubaydi, Haider Dhia
    Varga, Pal
    Molnar, Sandor
    SENSORS, 2023, 23 (02)
  • [24] A systematic review on elliptic curve cryptography algorithm for internet of things: Categorization, application areas, and security
    Adeniyi, Abidemi Emmanuel
    Jimoh, Rasheed Gbenga
    Awotunde, Joseph Bamidele
    COMPUTERS & ELECTRICAL ENGINEERING, 2024, 118
  • [25] Internet of Things (IoT) Security Requirements: Issues Related to Sensors
    Alqarni, Hussain
    Alnahari, Wael
    Quasim, Mohammad Tabrez
    2021 IEEE NATIONAL COMPUTING COLLEGES CONFERENCE (NCCC 2021), 2021, : 29 - 34
  • [26] A Security Generic Service Interface of Internet of Things (IoT) Platforms
    Kim, Mi
    Lee, Nam Yong
    Park, Jin Ho
    SYMMETRY-BASEL, 2017, 9 (09):
  • [27] Security standard compliance and continuous verification for Industrial Internet of Things
    Bicaku, Ani
    Tauber, Markus
    Delsing, Jerker
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2020, 16 (06)
  • [28] Understanding Security Requirements and Challenges in Internet of Things (IoT): A Review
    Hameed, Sufian
    Khan, Faraz Idris
    Hameed, Bilal
    JOURNAL OF COMPUTER NETWORKS AND COMMUNICATIONS, 2019, 2019
  • [29] Security Challenges and Opportunities for Smart Contracts in Internet of Things: A Survey
    Peng, Kai
    Li, Meijun
    Huang, Haojun
    Wang, Chen
    Wan, Shaohua
    Choo, Kim-Kwang Raymond
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (15) : 12004 - 12020
  • [30] Machine learning and the Internet of Things security: Solutions and open challenges
    Farooq, Umer
    Tariq, Noshina
    Asim, Muhammad
    Baker, Thar
    Al-Shamma'a, Ahmed
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2022, 162 : 89 - 104