Application of network security penetration technology in power internet of things security vulnerability detection

被引:4
|
作者
Chen, Ze [1 ]
Zuo, Xiaojun [1 ]
Dong, Na [1 ]
Hou, Botao [1 ]
机构
[1] State Grid Hebei Elect Power Res Inst, Shijiazhuang 050021, Hebei, Peoples R China
关键词
FRAMEWORK;
D O I
10.1002/ett.3859
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The emergence of network penetration attacks makes network security problems more and more prominent. To better detect network penetration attacks, this article first proposes an attack detection method based on ant colony classification rules mining algorithm based on swarm intelligence theory. Classification rules perform pattern matching to detect attack behavior. Second, the quantitative problem in the evaluation mechanism of power internet security vulnerability is analyzed. The addition and deletion of power internet of things (IoT) security assessment elements introduces a probabilistic computing model, improves the vulnerability assessment mechanism of power object networks, and solves the problem of power object network security and quantitative computing. Finally, after performing a series of preprocessing on the dataset, using the above method to find the classification rule or classification center, respectively, perform pattern matching or similarity calculation, and finally obtain the attack detection result. A series of evaluation functions are established in the experiment, and the experimental results are compared with other related algorithms. The results show that the method can effectively detect network penetration attacks and IoT security vulnerabilities, and the effectiveness of attack detection methods is greatly improved.
引用
收藏
页数:13
相关论文
共 50 条
  • [31] Network Security Technology of Intelligent Information Terminal Based on Mobile Internet of Things
    Sun, Ning
    Li, Tao
    Song, Gongfei
    Xia, Haoran
    MOBILE INFORMATION SYSTEMS, 2021, 2021
  • [32] Authentication Technology in Internet of Things and Privacy Security Issues in Typical Application Scenarios
    Zhao, Junhui
    Hu, Huanhuan
    Huang, Fanwei
    Guo, Yingxuan
    Liao, Longxia
    ELECTRONICS, 2023, 12 (08)
  • [33] Security in the internet of things
    Aigner M.
    Cryptology and Information Security Series, 2010, 4 : 109 - 124
  • [34] Security Control Redundancy Allocation Technology and Security Keys Based on Internet of Things
    Yang, Aimin
    Li, Yifan
    Kong, Fanbei
    Wang, Guoqing
    Chen, Enhong
    IEEE ACCESS, 2018, 6 : 50187 - 50196
  • [35] Internet of things security
    Dazine, Jihad
    Maizate, Abderrahim
    Hassouni, Larbi
    2018 IEEE INTERNATIONAL CONFERENCE ON TECHNOLOGY MANAGEMENT, OPERATIONS AND DECISIONS (ICTMOD), 2018, : 137 - 141
  • [36] Internet of Things Security
    Chahid, Yassine
    Benabdellah, Mohamed
    Azizi, Abdelmalek
    2017 INTERNATIONAL CONFERENCE ON WIRELESS TECHNOLOGIES, EMBEDDED AND INTELLIGENT SYSTEMS (WITS), 2017,
  • [37] Internet of things security
    Baskaran S.B.M.
    Journal of ICT Standardization, 2019, 7 (01): : 21 - 39
  • [38] Network Layer Security Detection Model of Internet of Things Based on Immune System
    Yang, Bo
    5TH ANNUAL INTERNATIONAL CONFERENCE ON INFORMATION SYSTEM AND ARTIFICIAL INTELLIGENCE (ISAI2020), 2020, 1575
  • [39] Security and privacy in the Internet of Things using blockchain technology
    Spathoulas, Georgios
    Karageorgopoulou, Angeliki
    2019 15TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING IN SENSOR SYSTEMS (DCOSS), 2019, : 284 - 290
  • [40] Research on Defects and Countermeasures of Internet of Things Security Technology
    Lin, Jie
    2018 4TH INTERNATIONAL CONFERENCE ON ENVIRONMENTAL SCIENCE AND MATERIAL APPLICATION, 2019, 252