A threat recognition solution of edge data security in industrial internet

被引:0
|
作者
Qianmu Li
Huaqiu Long
Zhuoran Xu
Jun Hou
Junhui Cai
机构
[1] Nanjing University of Science and Technology,School of Computer Science and Engineering
[2] Wuyi University,Intelligent Manufacturing Department
[3] Nanjing Vocational University of Industry Technology,School of Social Science
来源
World Wide Web | 2022年 / 25卷
关键词
Edge computing in industrial Internet; Edge data security; Multi-step attack; Threat identification;
D O I
暂无
中图分类号
学科分类号
摘要
Edge computing, as a computing model closer to industrial data sources, has gradually become the focus of industrial Internet. The edge computing of the Industrial Internet has the characteristics of distribution, openness, and interconnection. Therefore, the resources distributed on the edge are more vulnerable to malicious attacks from the outside world, resulting in economic losses. Especially in recent years, the means of multi-step attack are more complex and more secret, and the traditional threat identification algorithm may be difficult to find the real destruction strategy behind the attacker. In this paper, an intrusion detection System based on improved Chimp Optimization Algorithm (IChOA) and a attribute association-based multi-step attack threat recognition algorithm (AABMATR) is proposed, which can solve the problems of low accuracy of existing multi-step attack association algorithm and difficulty in accurately discovering the attack mode behind malicious attackers. By calculating the multi-step attack frequency matrix and similarity, a multi-step attack directed graph is generated, and the forward correlation strength is calculated to predict the attacker's next attack plan. Experiments were conducted on the public industrial control traffic data set 4ICS Geek Lounge, and compared with existing algorithms, higher correlation accuracy was obtained. This paper combines the existing research results to improve and innovate, and proposes the edge computing threat recognition algorithm of the industrial Internet, and has obtained good experimental results, which has a certain positive significance for protecting the resource security of the industrial Internet, especially the data security.
引用
收藏
页码:2109 / 2138
页数:29
相关论文
共 50 条
  • [1] A threat recognition solution of edge data security in industrial internet
    Li, Qianmu
    Long, Huaqiu
    Xu, Zhuoran
    Hou, Jun
    Cai, Junhui
    World Wide Web, 2022, 25 (05) : 2109 - 2138
  • [2] A threat recognition solution of edge data security in industrial internet
    Li, Qianmu
    Long, Huaqiu
    Xu, Zhuoran
    Hou, Jun
    Cai, Junhui
    WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2022, 25 (05): : 2109 - 2138
  • [3] Integration of a Threat Traceability Solution in the Industrial Internet of Things
    Rubio, Juan E.
    Roman, Rodrigo
    Lopez, Javier
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (10) : 6575 - 6583
  • [4] Accurate threat hunting in industrial internet of things edge devices
    Abbas Yazdinejad
    Behrouz Zolfaghari
    Ali Dehghantanha
    Hadis Karimipour
    Gautam Srivastava
    Reza MParizi
    Digital Communications and Networks, 2023, 9 (05) : 1123 - 1130
  • [5] Accurate threat hunting in industrial internet of things edge devices
    Yazdinejad, Abbas
    Zolfaghari, Behrouz
    Dehghantanha, Ali
    Karimipour, Hadis
    Srivastava, Gautam
    Parizi, Reza M.
    DIGITAL COMMUNICATIONS AND NETWORKS, 2023, 9 (05) : 1123 - 1130
  • [6] Task offloading for edge computing in industrial Internet with joint data compression and security protection
    Zhongmin Wang
    Yurong Ding
    Xiaomin Jin
    Yanping Chen
    Cong Gao
    The Journal of Supercomputing, 2023, 79 : 4291 - 4317
  • [7] Task offloading for edge computing in industrial Internet with joint data compression and security protection
    Wang, Zhongmin
    Ding, Yurong
    Jin, Xiaomin
    Chen, Yanping
    Gao, Cong
    JOURNAL OF SUPERCOMPUTING, 2023, 79 (04): : 4291 - 4317
  • [8] Edge Artificial Intelligence for Industrial Internet of Things Applications: An Industrial Edge Intelligence Solution
    Foukalas, Fotis
    Tziouvaras, Athanasios
    IEEE INDUSTRIAL ELECTRONICS MAGAZINE, 2021, 15 (02) : 28 - 36
  • [9] Autonomous Threat Response at the Edge Processing Level in the Industrial Internet of Things
    Czeczot, Grzegorz
    Rojek, Izabela
    Mikolajewski, Dariusz
    ELECTRONICS, 2024, 13 (06)
  • [10] An Efficient Security Solution for Industrial Internet of Things Applications
    Almagrabi, Alaa Omran
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 72 (02): : 3961 - 3983