Internet of Things Information Network Security Situational Awareness Based on Machine Learning Algorithms
In order to accurately predict the security situation of Internet of Things information network, a research method based on machine learning algorithm for security situational awareness of Internet of Things information network is proposed. The perception result is represented by the perception mode...
Saved in:
| Published in | Mobile information systems Vol. 2022; pp. 1 - 7 |
|---|---|
| Main Author | |
| Format | Journal Article |
| Language | English |
| Published |
Amsterdam
Hindawi
21.07.2022
John Wiley & Sons, Inc |
| Subjects | |
| Online Access | Get full text |
| ISSN | 1574-017X 1875-905X 1875-905X |
| DOI | 10.1155/2022/4146042 |
Cover
| Abstract | In order to accurately predict the security situation of Internet of Things information network, a research method based on machine learning algorithm for security situational awareness of Internet of Things information network is proposed. The perception result is represented by the perception model, the sample data are preprocessed based on the linear discriminant analysis method, the sample data are optimized to obtain the combined features, and then the processed data are used as the training input of the RBF neural network to find out the mapping relationship with the network situation value, so as to quantify the security posture of the system. The results show that automatic discovery and classification of seven violations is achieved. Since the platform was launched in China Mobile, more than 65,000 suspected illegal IoT cards have been discovered, effectively monitoring and controlling the operation and behavior of IoT cards. The processing efficiency of IoT card violations has been increased by more than 20 times. After the system is put into use, the discovery of suspected illegal users and behaviors can be realized through full automation, and the process of analysis, confirmation, and disposal can be shortened to 2 hours, which effectively reduce the false alarm rate and reduce operator costs. In previous monitoring of IoT cards, the false-positive rate of illegal IoT cards was about 83%, while the false-positive rate of existing algorithms dropped to 20%.Monitoring shows that business abuse monitoring detects the highest proportion of illegal IoT cards, 59%; infractions of Internet of Things cards detected through Internet abuse monitoring accounted for 20%; the proportion of Internet of Things card with machine card separation is 8%; in the information security risk monitoring (including spam text messages and harassing phone calls), the number of illegal Internet of Things cards found is small, only 3% and 2%, respectively; other infractions, including unauthorized use in locations and user complaints, accounted for 8%. It can effectively improve the ability to discover illegal IoT cards, greatly improve the accuracy of judgment, and improve the efficiency of disposal. The comparison verifies that the method is reliable and effective in the security situation awareness of the Internet of Things information network. Using the Internet of Things information security management system software based on the machine learning algorithm, the system software suitable for anomaly data detection is trained by adjusting the main parameters of the algorithm, which improves the automation and intelligence degree of the system software. |
|---|---|
| AbstractList | In order to accurately predict the security situation of Internet of Things information network, a research method based on machine learning algorithm for security situational awareness of Internet of Things information network is proposed. The perception result is represented by the perception model, the sample data are preprocessed based on the linear discriminant analysis method, the sample data are optimized to obtain the combined features, and then the processed data are used as the training input of the RBF neural network to find out the mapping relationship with the network situation value, so as to quantify the security posture of the system. The results show that automatic discovery and classification of seven violations is achieved. Since the platform was launched in China Mobile, more than 65,000 suspected illegal IoT cards have been discovered, effectively monitoring and controlling the operation and behavior of IoT cards. The processing efficiency of IoT card violations has been increased by more than 20 times. After the system is put into use, the discovery of suspected illegal users and behaviors can be realized through full automation, and the process of analysis, confirmation, and disposal can be shortened to 2 hours, which effectively reduce the false alarm rate and reduce operator costs. In previous monitoring of IoT cards, the false-positive rate of illegal IoT cards was about 83%, while the false-positive rate of existing algorithms dropped to 20%.Monitoring shows that business abuse monitoring detects the highest proportion of illegal IoT cards, 59%; infractions of Internet of Things cards detected through Internet abuse monitoring accounted for 20%; the proportion of Internet of Things card with machine card separation is 8%; in the information security risk monitoring (including spam text messages and harassing phone calls), the number of illegal Internet of Things cards found is small, only 3% and 2%, respectively; other infractions, including unauthorized use in locations and user complaints, accounted for 8%. It can effectively improve the ability to discover illegal IoT cards, greatly improve the accuracy of judgment, and improve the efficiency of disposal. The comparison verifies that the method is reliable and effective in the security situation awareness of the Internet of Things information network. Using the Internet of Things information security management system software based on the machine learning algorithm, the system software suitable for anomaly data detection is trained by adjusting the main parameters of the algorithm, which improves the automation and intelligence degree of the system software. |
| Author | Meng, Lei |
| Author_xml | – sequence: 1 givenname: Lei orcidid: 0000-0003-4334-4797 surname: Meng fullname: Meng, Lei organization: Economics and Management School of Harbin University of Science and TechnologyHarbin 150080China |
| BookMark | eNqFkE1LAzEQhoMoqNWbPyDgUddOkk2yPVbxo1D10AreljTN6tZtUpMsS_-9aetJUE8zMM-8zDzHaN86axA6I3BFCOd9CpT2c5ILyOkeOiKF5NkA-Ot-6rnMMyDy9RAdh7AAEMC4PEKLkY3GWxOxq_D0vbZvAY9s5fxSxdpZ_GRi5_wHnhjd-jqu8aSO7XakGjzslDfWhICvVTBznPhHpVOIwWOjvE1peNi8ubT4vgwn6KBSTTCn37WHXu5upzcP2fj5fnQzHGeaMRkzAhqYBskLpjmbgVBUUjKrDBSqACllJTUp5oWYQXqK01zygRBcCaOYZIVmPZTtclu7UutONU258vVS-XVJoNyIKjeiym9RiT_f8SvvPlsTYrlwrU__hZKKgZA5CEkSRXeU9i4Eb6pS13ErInpVN79FX_5Y-ueSix2eFM5VV_9NfwG-xJOy |
| CitedBy_id | crossref_primary_10_1080_09540091_2023_2284649 crossref_primary_10_1016_j_procs_2024_04_156 |
| Cites_doi | 10.1007/978-3-662-46463-2_36 10.1155/2022/8933468 10.1186/s13174-014-0010-4 10.1155/2020/8886877 10.32628/cseit206444 10.1007/s10479-014-1775-3 10.1016/j.future.2018.03.016 10.4028/www.scientific.net/kem.693.1391 10.12733/jics20105271 10.2174/1874444301507011834 10.1007/s00521-019-04571-5 10.1007/978-3-319-11218-3_29 10.13089/jkiisc.2016.26.4.903 10.1016/s1353-4858(19)30050-9 10.13052/jsn2445-9739.2016.010 10.3233/jifs-179518 |
| ContentType | Journal Article |
| Copyright | Copyright © 2022 Lei Meng. Copyright © 2022 Lei Meng. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0 |
| Copyright_xml | – notice: Copyright © 2022 Lei Meng. – notice: Copyright © 2022 Lei Meng. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0 |
| DBID | RHU RHW RHX AAYXX CITATION 7SC 7SP 8FD JQ2 L7M L~C L~D ADTOC UNPAY |
| DOI | 10.1155/2022/4146042 |
| DatabaseName | Hindawi Publishing Complete Hindawi Publishing Subscription Journals Hindawi Publishing Open Access CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional Unpaywall for CDI: Periodical Content Unpaywall |
| DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | Technology Research Database CrossRef |
| Database_xml | – sequence: 1 dbid: RHX name: Hindawi Publishing Open Access url: http://www.hindawi.com/journals/ sourceTypes: Publisher – sequence: 2 dbid: UNPAY name: Unpaywall url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/ sourceTypes: Open Access Repository |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 1875-905X |
| Editor | Yu, Jiguo |
| Editor_xml | – sequence: 1 givenname: Jiguo surname: Yu fullname: Yu, Jiguo |
| EndPage | 7 |
| ExternalDocumentID | 10.1155/2022/4146042 10_1155_2022_4146042 |
| GeographicLocations | China |
| GeographicLocations_xml | – name: China |
| GrantInformation_xml | – fundername: Chinese National Funding of Social Sciences grantid: 20BJL028 |
| GroupedDBID | -CS -CY .4S .DC 0R~ 4.4 5VS AAFWJ AAJEY ABHFT ABJNI ACGFO ACGFS ADBBV AEGXH AENEX AIAGR ALMA_UNASSIGNED_HOLDINGS ARCSS ASPBG AVWKF BCNDV EBS EDO GROUPED_DOAJ HZ~ I-F IAO IHR IOS KQ8 KZ1 LMP MIO MV1 NGNOM O9- OK1 P2P RHU RHW RHX TUS 24P AAMMB AAYXX ACCMX AEFGJ AGXDD AIDQK AIDYY CITATION H13 7SC 7SP 8FD JQ2 L7M L~C L~D ABUBZ ACPQW ADTOC AFRHK AGIAB CAG COF EJD FEDTE IL9 IPNFZ MET RIG UNPAY |
| ID | FETCH-LOGICAL-c337t-10c03c07583c53b06a2721bfe08a80777f7c18d86b0157524759665a6ea3738c3 |
| IEDL.DBID | UNPAY |
| ISSN | 1574-017X 1875-905X |
| IngestDate | Sun Oct 26 04:15:07 EDT 2025 Fri Jul 25 09:28:38 EDT 2025 Wed Oct 01 01:58:58 EDT 2025 Thu Apr 24 23:11:52 EDT 2025 Sun Jun 02 19:22:34 EDT 2024 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Language | English |
| License | This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. https://creativecommons.org/licenses/by/4.0 cc-by |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c337t-10c03c07583c53b06a2721bfe08a80777f7c18d86b0157524759665a6ea3738c3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0003-4334-4797 |
| OpenAccessLink | https://proxy.k.utb.cz/login?url=https://downloads.hindawi.com/journals/misy/2022/4146042.pdf |
| PQID | 2696740671 |
| PQPubID | 2048814 |
| PageCount | 7 |
| ParticipantIDs | unpaywall_primary_10_1155_2022_4146042 proquest_journals_2696740671 crossref_citationtrail_10_1155_2022_4146042 crossref_primary_10_1155_2022_4146042 hindawi_primary_10_1155_2022_4146042 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 2022-07-21 |
| PublicationDateYYYYMMDD | 2022-07-21 |
| PublicationDate_xml | – month: 07 year: 2022 text: 2022-07-21 day: 21 |
| PublicationDecade | 2020 |
| PublicationPlace | Amsterdam |
| PublicationPlace_xml | – name: Amsterdam |
| PublicationTitle | Mobile information systems |
| PublicationYear | 2022 |
| Publisher | Hindawi John Wiley & Sons, Inc |
| Publisher_xml | – name: Hindawi – name: John Wiley & Sons, Inc |
| References | 12 13 14 Y. Cui (5) 2018; 85 G. Yu (7) 2020; 40 15 16 17 19 S. Diab (11) 2019; 16 G. Cao (20) 2021; 12 1 2 3 4 6 8 9 P. Barthakur (18) 2015; 17 10 |
| References_xml | – ident: 3 doi: 10.1007/978-3-662-46463-2_36 – ident: 14 doi: 10.1155/2022/8933468 – ident: 13 doi: 10.1186/s13174-014-0010-4 – volume: 40 start-page: 1 issue: 3 year: 2020 ident: 7 article-title: Research on computer network information security based on improved machine learning publication-title: Journal of Intelligent and Fuzzy system software – ident: 8 doi: 10.1155/2020/8886877 – ident: 19 doi: 10.32628/cseit206444 – ident: 17 doi: 10.1007/s10479-014-1775-3 – volume: 85 start-page: 107 year: 2018 ident: 5 article-title: Research on data fusion algorithm and anti-collision algorithm based on internet of things - sciencedirect publication-title: Future Generation Computer system software doi: 10.1016/j.future.2018.03.016 – ident: 1 doi: 10.4028/www.scientific.net/kem.693.1391 – volume: 16 start-page: 155 issue: 12 year: 2019 ident: 11 article-title: Optimizing stochastic gradient descent in text classification based on fine-tuning hyper-parameters approach. a case study on automatic classification of global terrorist attacks publication-title: International Journal of Computer Science and Information Security – ident: 12 doi: 10.12733/jics20105271 – ident: 2 doi: 10.2174/1874444301507011834 – ident: 6 doi: 10.1007/s00521-019-04571-5 – volume: 12 start-page: 183 year: 2021 ident: 20 article-title: Segmentation of intracerebral hemorrhage based on improved u-net publication-title: Journal of Imaging Science and Technology – ident: 15 doi: 10.1007/978-3-319-11218-3_29 – ident: 4 doi: 10.13089/jkiisc.2016.26.4.903 – ident: 16 doi: 10.1016/s1353-4858(19)30050-9 – ident: 9 doi: 10.13052/jsn2445-9739.2016.010 – ident: 10 doi: 10.3233/jifs-179518 – volume: 17 start-page: 522 issue: 5 year: 2015 ident: 18 article-title: Adoption of a fuzzy based classification model for p2p botnet detection publication-title: International Journal on Network Security |
| SSID | ssj0060357 ssib050733852 |
| Score | 2.2693632 |
| Snippet | In order to accurately predict the security situation of Internet of Things information network, a research method based on machine learning algorithm for... |
| SourceID | unpaywall proquest crossref hindawi |
| SourceType | Open Access Repository Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 1 |
| SubjectTerms | Algorithms Artificial intelligence Automation Cards Discriminant analysis False alarms Information management Internet of Things Machine learning Monitoring Neural networks Perception Posture Security Short message service Situational awareness Software |
| SummonAdditionalLinks | – databaseName: Hindawi Publishing Open Access dbid: RHX link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1bS8MwFA46EH3xLk6n5GH6IsW2aZL2cYpjCNuDc9C3kqbZRWo3XMfw33vSpsMpXh4Lpymck-R8X3ryHYSanhSEDZljBSpOLC9wfUsoGmt5bQC8rnSp0ESx22OdgfcY0tCIJM2__8KHbKfpuXvrwYqG-bWJNn2mK7eeOmE1bajuO1hcAS43YGaTQuDToVwXWPCwqnf_MtZaJtoaawq8nKwBze1FNhPvS5Gmn3JOex_tGrCIW2V0D9CGyg7RXtWIAZt1eYReynM9lePpEJedOLG5Z6T9jntlrTfum2Z1uD_JF-YUELeW-j4YbHj4DjJagsG-W1RYKmzEV0e4lY6m8OL4dX6MBu2H5_uOZZooWJIQnsM2K20iARj4RFIS20y4QPriobJ94duc8yGXjp_4LAZgwKmr9f8Yo4IpoUWPJDlBtWyaqVOE4UkEHueJUMCqExlIh8cKKCZPfOrJoI5uKodG0iiM60YXaVQwDUoj7f7IuL-OrlbWs1JZ4we7ponNH2aNKnCRWYbzyGUB4wBZuFNH16tg_jrO2f8-d4529KM-5XWdBqrlbwt1AfAkjy-LyfkB9U7Xtg priority: 102 providerName: Hindawi Publishing |
| Title | Internet of Things Information Network Security Situational Awareness Based on Machine Learning Algorithms |
| URI | https://dx.doi.org/10.1155/2022/4146042 https://www.proquest.com/docview/2696740671 https://downloads.hindawi.com/journals/misy/2022/4146042.pdf |
| UnpaywallVersion | publishedVersion |
| Volume | 2022 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAFT databaseName: Colorado Digital library customDbUrl: eissn: 1875-905X dateEnd: 20240530 omitProxy: true ssIdentifier: ssj0060357 issn: 1875-905X databaseCode: KQ8 dateStart: 20050101 isFulltext: true titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html providerName: Colorado Alliance of Research Libraries – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 1875-905X dateEnd: 99991231 omitProxy: true ssIdentifier: ssib050733852 issn: 1574-017X databaseCode: M~E dateStart: 20050101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre – providerCode: PRVWIB databaseName: Wiley Online Library Open Access customDbUrl: eissn: 1875-905X dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0060357 issn: 1875-905X databaseCode: 24P dateStart: 20050101 isFulltext: true titleUrlDefault: https://authorservices.wiley.com/open-science/open-access/browse-journals.html providerName: Wiley-Blackwell |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3dT9swED9B0TRe6IAhOjrkB-BlSsmX7UTipUxD1RAVH6sUHlDk2A5fpa3WVBX89ZwbB61I2xAvUSxdHNt3tn9nnX8HsBNKEbCceU6sM-WEsR85QtPM0Gsj4PWlT4VxFE-6rNMLfyY0WYCD6i6MMhTxQ6HGrRvjk05vZ6u1HdfxPvb90fjr_n6IUxwNrjVS-SIsMYpIvAZLve5p-3JGkcpNcAVPzDtCcid2aVLFvVM6V8XcjvTB_nYOcH6cDEbicSr6_T_2nqM6XFWtLkNO7luTImvJp1eEju_t1idYsaCUtEsrWoUFPViDepXwgdj5vw535fmhLsgwJ2XGT2LvMxn9km4ZU04ubFI8cnFbTOxpI2lPzb0zXFjJIe6ciqD8ySySUxNL8npN2v3rIX548zD-DL2jH7--dxybrMGRQcALXM6lG0gEIFEgaZC5TPjoXGa5diMRuZzznEsvUhHLEIBw6hueQcaoYFoYciUZbEBtMBzoTSBYEnHIuRIavXclY-nxTKMry1VEQxk34FulsFRaJnOTUKOfzjwaSlMzlKkdygbsvkiPSgaPv8jtWN38R6xZGUZa6S_1Wcw4QiPuNWDvxVj-Wc-XtwpuwbIpmvNk32tCrfg90V8RCBXZNiwen0X4PO8k29b2nwEkkQNo |
| linkProvider | Unpaywall |
| linkToUnpaywall | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LSwMxEB60InrxLdYXOagX2bqvJLvgpYoigkXQQj3Ikk2yvmpb7Jaiv95JNytW8IG3DcxmN5lJ8s0w-QZgJ5QiYBnznFinygljP3KEpqmh10bA60ufCuMoXjTYWTM8b9HWBByWd2GUoYjvCtWv3RufdPgw2q3tvPYPcOyvxl_3D0Jc4mhwtZ7KJmGKUUTiFZhqNi7rNyOKVG6SK3jLPCMkd2KXtsq8d0rHuhg7kabtZ8cA58yg0xOvQ9Fufzp7TufhtvzrIuXkqTbI05p8-0Lo-N9hLcCcBaWkXljRIkzozhLMlwUfiF3_y_BYxA91TroZKSp-EnufyeiXNIqccnJli-KRq4d8YKONpD40985wYyVHeHIqgvIXo0xOTSzJ6x2pt--6-OL9c38Fmqcn18dnji3W4Mgg4Dlu59INJAKQKJA0SF0mfHQu00y7kYhcznnGpRepiKUIQDj1Dc8gY1QwLQy5kgxWodLpdvQaEGyJOORcCY3eu5Kx9Hiq0ZXlKqKhjKuwXyoskZbJ3BTUaCcjj4bSxExlYqeyCrsf0r2CweMbuR2rm1_ENkvDSEr9JT6LGUdoxL0q7H0Yy4_9rP9VcANmTdPEk31vEyr5y0BvIRDK021r7-8NOgFg |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Internet+of+Things+Information+Network+Security+Situational+Awareness+Based+on+Machine+Learning+Algorithms&rft.jtitle=Mobile+information+systems&rft.au=Meng%2C+Lei&rft.date=2022-07-21&rft.pub=Hindawi&rft.issn=1574-017X&rft.eissn=1875-905X&rft.volume=2022&rft_id=info:doi/10.1155%2F2022%2F4146042&rft.externalDocID=10_1155_2022_4146042 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1574-017X&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1574-017X&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1574-017X&client=summon |