A Network Attack Detection Method Using SDA and Deep Neural Network Based on Internet of Things

被引:4
作者
Li, Jingwei [1 ]
Sun, Bo [1 ]
机构
[1] Henan Inst Technol, Coll Comp Sci & Technol, Xinxiang 453002, Henan, Peoples R China
基金
中国国家自然科学基金;
关键词
Internet of Things; Deep neural network; Network attack; Security early warning; Stacked denoising autoencoder; Unsupervised feature learning; INTRUSION DETECTION SYSTEM; FEATURE-SELECTION; ENTROPY;
D O I
10.1007/s10776-019-00462-7
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Aiming at the deficiency of network attack detection, a network attack detection method based on deep neural network is proposed. Firstly, the deep neural network technology is used to study the self-adaptive identification method of the security state, intelligently discriminate the security index of the network, recall comparative learning based on historical data, and establish the classification and identification database of network security. Then, according to the information of security classification and identification database, the corresponding state risk assessment system is mapped. Based on the risk intensity, different levels of early warnings are given. Finally, experimental simulation analysis is carried out to demonstrate the effectiveness of the proposed method. The simulation results show that the proposed method can actively send out early warning before the network is attacked, which obtains a high accuracy of early warning.
引用
收藏
页码:209 / 214
页数:6
相关论文
共 17 条
[1]   Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model [J].
Aljawarneh, Shadi ;
Aldwairi, Monther ;
Yassein, Muneer Bani .
JOURNAL OF COMPUTATIONAL SCIENCE, 2018, 25 :152-160
[2]   A survey on security control and attack detection for industrial cyber-physical systems [J].
Ding, Derui ;
Han, Qing-Long ;
Xiang, Yang ;
Ge, Xiaohua ;
Zhang, Xian-Ming .
NEUROCOMPUTING, 2018, 275 :1674-1683
[3]   Locomotion Activity Recognition Using Stacked Denoising Autoencoders [J].
Gu, Fuqiang ;
Khoshelham, Kourosh ;
Valaee, Shahrokh ;
Shang, Jianga ;
Zhang, Rui .
IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (03) :2085-2093
[4]   Network Anomaly Detection System using Genetic Algorithm and Fuzzy Logic [J].
Hamamoto, Anderson Hiroshi ;
Carvalho, Luiz Fernando ;
Hiera Sampaio, Lucas Dias ;
Abrao, Taufik ;
Proenca, Mario Lemes, Jr. .
EXPERT SYSTEMS WITH APPLICATIONS, 2018, 92 :390-402
[5]  
Jin L., 2010, INT S AW COMP
[6]   Feature Selection of Denial-of-Service Attacks Using Entropy and Granular Computing [J].
Khan, Suleman ;
Gani, Abdullah ;
Wahab, Ainuddin Wahid Abdul ;
Singh, Prem Kumar .
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2018, 43 (02) :499-508
[7]   Challenges and prospects of 3D micro-supercapacitors for powering the internet of things [J].
Lethien, Christophe ;
Le Bideau, Jean ;
Brousse, Thierry .
ENERGY & ENVIRONMENTAL SCIENCE, 2019, 12 (01) :96-115
[8]   Sentinel: Breaking the Bottleneck of Energy Utilization Efficiency in RF-Powered Devices [J].
Li, Songfan ;
Lu, Li ;
Hussain, Muhammad Jawad ;
Ye, Yalan ;
Zhu, Hongzi .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (01) :705-717
[9]  
[吕镇邦 LU Zhenbang], 2008, [四川大学学报. 工程科学版, Journal of Sichuan University. Engineering Science Edition], V40, P122
[10]   N-BaIoT-Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders [J].
Meidan, Yair ;
Bohadana, Michael ;
Mathov, Yael ;
Mirsky, Yisroel ;
Shabtai, Asaf ;
Breitenbacher, Dominik ;
Elovici, Yuval .
IEEE PERVASIVE COMPUTING, 2018, 17 (03) :12-22