Industrial Internet of Things Anti-Intrusion Detection System by Neural Network in the Context of Internet of Things for Privacy Law Security Protection

被引:2
作者
Teng, Di [1 ]
机构
[1] Harbin Finance Univ, Dept Law, Harbin 150000, Peoples R China
关键词
D O I
10.1155/2022/7182989
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Today, the Industrial Internet of Things (IIoT) and network technology are highly developed, and network data breaches occur every year. Therefore, an anti-intrusion detection system has been established to improve the privacy law security protection of IIoT. In the adversarial network, the security performance requirements and structural system of the Internet of Things have high-strength requirements. The network system must adopt a system with strong stability and a low data loss rate. After comparing a large number of network structures, the initial network technology in deep learning is adopted. The Convolutional Neural Network (CNN) technology for handwritten character recognition optimizes and upgrades the LeNet-5 network, and the new LeNet-7 is built. Additionally, three network technologies are combined, and an IIoT anti-intrusion detection system is constructed. The performance of the system is tested and verified. The model has high data accuracy, detection rate, and low false-positive rate. The model's generality on high-performance data is validated and compared with privacy-aware task offloading methods, achieving the best performance. Therefore, the system can be applied to the data privacy law security protection of IIoT.
引用
收藏
页数:17
相关论文
共 39 条
  • [1] A Secure Industrial Internet of Things (IIoT) Framework for Resource Management in Smart Manufacturing
    Abuhasel, Khaled Ali
    Khan, Mohammad Ayoub
    [J]. IEEE ACCESS, 2020, 8 : 117354 - 117364
  • [2] A novel optimization algorithm (Lion-AYAD) to find optimal DNA protein synthesis
    Al-Janabi, Samaher
    Alkaim, Ayad
    [J]. EGYPTIAN INFORMATICS JOURNAL, 2022, 23 (02) : 271 - 290
  • [3] Intelligent forecaster of concentrations (PM2.5, PM10, NO2, CO, O3, SO2) caused air pollution (IFCsAP)
    Al-Janabi, Samaher
    Alkaim, Ayad
    Al-Janabi, Ehab
    Aljeboree, Aseel
    Mustafa, M.
    [J]. NEURAL COMPUTING & APPLICATIONS, 2021, 33 (21) : 14199 - 14229
  • [4] An Innovative synthesis of deep learning techniques (DCapsNet & DCOM) for generation electrical renewable energy from wind energy
    Al-Janabi, Samaher
    Alkaim, Ayad F.
    Adel, Zuhal
    [J]. SOFT COMPUTING, 2020, 24 (14) : 10943 - 10962
  • [5] A nifty collaborative analysis to predicting a novel tool (DRFLLS) for missing values estimation
    Al-Janabi, Samaher
    Alkaim, Ayad F.
    [J]. SOFT COMPUTING, 2020, 24 (01) : 555 - 569
  • [6] Al-Janabi S, 2014, 2014 INTERNATIONAL CONGRESS ON TECHNOLOGY, COMMUNICATION AND KNOWLEDGE (ICTCK)
  • [7] Deep Belief Network enhanced intrusion detection system to prevent security breach in the Internet of Things
    Balakrishnan, Nagaraj
    Rajendran, Arunkumar
    Pelusi, Danilo
    Ponnusamy, Vijayakumar
    [J]. INTERNET OF THINGS, 2021, 14
  • [8] Baraneetharan E., 2020, J INF TECHNOL-UK, V2, P161
  • [9] A Hierarchical Hybrid Intrusion Detection Approach in IoT Scenarios
    Bovenzi, Giampaolo
    Aceto, Giuseppe
    Ciuonzo, Domenico
    Persico, Valerio
    Pescape, Antonio
    [J]. 2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2020,
  • [10] Intelligent manufacturing production line data monitoring system for industrial internet of things
    Chen, Wei
    [J]. COMPUTER COMMUNICATIONS, 2020, 151 : 31 - 41