Internet of Things Information Network Security Situational Awareness Based on Machine Learning Algorithms

In order to accurately predict the security situation of Internet of Things information network, a research method based on machine learning algorithm for security situational awareness of Internet of Things information network is proposed. The perception result is represented by the perception mode...

Full description

Saved in:
Bibliographic Details
Published inMobile information systems Vol. 2022; pp. 1 - 7
Main Author Meng, Lei
Format Journal Article
LanguageEnglish
Published Amsterdam Hindawi 21.07.2022
John Wiley & Sons, Inc
Subjects
Online AccessGet full text
ISSN1574-017X
1875-905X
1875-905X
DOI10.1155/2022/4146042

Cover

Abstract In order to accurately predict the security situation of Internet of Things information network, a research method based on machine learning algorithm for security situational awareness of Internet of Things information network is proposed. The perception result is represented by the perception model, the sample data are preprocessed based on the linear discriminant analysis method, the sample data are optimized to obtain the combined features, and then the processed data are used as the training input of the RBF neural network to find out the mapping relationship with the network situation value, so as to quantify the security posture of the system. The results show that automatic discovery and classification of seven violations is achieved. Since the platform was launched in China Mobile, more than 65,000 suspected illegal IoT cards have been discovered, effectively monitoring and controlling the operation and behavior of IoT cards. The processing efficiency of IoT card violations has been increased by more than 20 times. After the system is put into use, the discovery of suspected illegal users and behaviors can be realized through full automation, and the process of analysis, confirmation, and disposal can be shortened to 2 hours, which effectively reduce the false alarm rate and reduce operator costs. In previous monitoring of IoT cards, the false-positive rate of illegal IoT cards was about 83%, while the false-positive rate of existing algorithms dropped to 20%.Monitoring shows that business abuse monitoring detects the highest proportion of illegal IoT  cards, 59%; infractions of Internet of Things cards detected through Internet abuse monitoring accounted for 20%; the proportion of Internet of Things card with machine card separation is 8%; in the information security risk monitoring (including spam text messages and harassing phone calls), the number of illegal Internet of Things cards found is small, only 3% and 2%, respectively; other infractions, including unauthorized use in locations and user complaints, accounted for 8%. It can effectively improve the ability to discover illegal IoT cards, greatly improve the accuracy of judgment, and improve the efficiency of disposal. The comparison verifies that the method is reliable and effective in the security situation awareness of the Internet of Things information network. Using the Internet of Things information security management system software based on the machine learning algorithm, the system software suitable for anomaly data detection is trained by adjusting the main parameters of the algorithm, which improves the automation and intelligence degree of the system software.
AbstractList In order to accurately predict the security situation of Internet of Things information network, a research method based on machine learning algorithm for security situational awareness of Internet of Things information network is proposed. The perception result is represented by the perception model, the sample data are preprocessed based on the linear discriminant analysis method, the sample data are optimized to obtain the combined features, and then the processed data are used as the training input of the RBF neural network to find out the mapping relationship with the network situation value, so as to quantify the security posture of the system. The results show that automatic discovery and classification of seven violations is achieved. Since the platform was launched in China Mobile, more than 65,000 suspected illegal IoT cards have been discovered, effectively monitoring and controlling the operation and behavior of IoT cards. The processing efficiency of IoT card violations has been increased by more than 20 times. After the system is put into use, the discovery of suspected illegal users and behaviors can be realized through full automation, and the process of analysis, confirmation, and disposal can be shortened to 2 hours, which effectively reduce the false alarm rate and reduce operator costs. In previous monitoring of IoT cards, the false-positive rate of illegal IoT cards was about 83%, while the false-positive rate of existing algorithms dropped to 20%.Monitoring shows that business abuse monitoring detects the highest proportion of illegal IoT  cards, 59%; infractions of Internet of Things cards detected through Internet abuse monitoring accounted for 20%; the proportion of Internet of Things card with machine card separation is 8%; in the information security risk monitoring (including spam text messages and harassing phone calls), the number of illegal Internet of Things cards found is small, only 3% and 2%, respectively; other infractions, including unauthorized use in locations and user complaints, accounted for 8%. It can effectively improve the ability to discover illegal IoT cards, greatly improve the accuracy of judgment, and improve the efficiency of disposal. The comparison verifies that the method is reliable and effective in the security situation awareness of the Internet of Things information network. Using the Internet of Things information security management system software based on the machine learning algorithm, the system software suitable for anomaly data detection is trained by adjusting the main parameters of the algorithm, which improves the automation and intelligence degree of the system software.
Author Meng, Lei
Author_xml – sequence: 1
  givenname: Lei
  orcidid: 0000-0003-4334-4797
  surname: Meng
  fullname: Meng, Lei
  organization: Economics and Management School of Harbin University of Science and TechnologyHarbin 150080China
BookMark eNqFkE1LAzEQhoMoqNWbPyDgUddOkk2yPVbxo1D10AreljTN6tZtUpMsS_-9aetJUE8zMM-8zDzHaN86axA6I3BFCOd9CpT2c5ILyOkeOiKF5NkA-Ot-6rnMMyDy9RAdh7AAEMC4PEKLkY3GWxOxq_D0vbZvAY9s5fxSxdpZ_GRi5_wHnhjd-jqu8aSO7XakGjzslDfWhICvVTBznPhHpVOIwWOjvE1peNi8ubT4vgwn6KBSTTCn37WHXu5upzcP2fj5fnQzHGeaMRkzAhqYBskLpjmbgVBUUjKrDBSqACllJTUp5oWYQXqK01zygRBcCaOYZIVmPZTtclu7UutONU258vVS-XVJoNyIKjeiym9RiT_f8SvvPlsTYrlwrU__hZKKgZA5CEkSRXeU9i4Eb6pS13ErInpVN79FX_5Y-ueSix2eFM5VV_9NfwG-xJOy
CitedBy_id crossref_primary_10_1080_09540091_2023_2284649
crossref_primary_10_1016_j_procs_2024_04_156
Cites_doi 10.1007/978-3-662-46463-2_36
10.1155/2022/8933468
10.1186/s13174-014-0010-4
10.1155/2020/8886877
10.32628/cseit206444
10.1007/s10479-014-1775-3
10.1016/j.future.2018.03.016
10.4028/www.scientific.net/kem.693.1391
10.12733/jics20105271
10.2174/1874444301507011834
10.1007/s00521-019-04571-5
10.1007/978-3-319-11218-3_29
10.13089/jkiisc.2016.26.4.903
10.1016/s1353-4858(19)30050-9
10.13052/jsn2445-9739.2016.010
10.3233/jifs-179518
ContentType Journal Article
Copyright Copyright © 2022 Lei Meng.
Copyright © 2022 Lei Meng. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0
Copyright_xml – notice: Copyright © 2022 Lei Meng.
– notice: Copyright © 2022 Lei Meng. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0
DBID RHU
RHW
RHX
AAYXX
CITATION
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
ADTOC
UNPAY
DOI 10.1155/2022/4146042
DatabaseName Hindawi Publishing Complete
Hindawi Publishing Subscription Journals
Hindawi Publishing Open Access
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
Unpaywall for CDI: Periodical Content
Unpaywall
DatabaseTitle CrossRef
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList
Technology Research Database
CrossRef
Database_xml – sequence: 1
  dbid: RHX
  name: Hindawi Publishing Open Access
  url: http://www.hindawi.com/journals/
  sourceTypes: Publisher
– sequence: 2
  dbid: UNPAY
  name: Unpaywall
  url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/
  sourceTypes: Open Access Repository
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1875-905X
Editor Yu, Jiguo
Editor_xml – sequence: 1
  givenname: Jiguo
  surname: Yu
  fullname: Yu, Jiguo
EndPage 7
ExternalDocumentID 10.1155/2022/4146042
10_1155_2022_4146042
GeographicLocations China
GeographicLocations_xml – name: China
GrantInformation_xml – fundername: Chinese National Funding of Social Sciences
  grantid: 20BJL028
GroupedDBID -CS
-CY
.4S
.DC
0R~
4.4
5VS
AAFWJ
AAJEY
ABHFT
ABJNI
ACGFO
ACGFS
ADBBV
AEGXH
AENEX
AIAGR
ALMA_UNASSIGNED_HOLDINGS
ARCSS
ASPBG
AVWKF
BCNDV
EBS
EDO
GROUPED_DOAJ
HZ~
I-F
IAO
IHR
IOS
KQ8
KZ1
LMP
MIO
MV1
NGNOM
O9-
OK1
P2P
RHU
RHW
RHX
TUS
24P
AAMMB
AAYXX
ACCMX
AEFGJ
AGXDD
AIDQK
AIDYY
CITATION
H13
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
ABUBZ
ACPQW
ADTOC
AFRHK
AGIAB
CAG
COF
EJD
FEDTE
IL9
IPNFZ
MET
RIG
UNPAY
ID FETCH-LOGICAL-c337t-10c03c07583c53b06a2721bfe08a80777f7c18d86b0157524759665a6ea3738c3
IEDL.DBID UNPAY
ISSN 1574-017X
1875-905X
IngestDate Sun Oct 26 04:15:07 EDT 2025
Fri Jul 25 09:28:38 EDT 2025
Wed Oct 01 01:58:58 EDT 2025
Thu Apr 24 23:11:52 EDT 2025
Sun Jun 02 19:22:34 EDT 2024
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Language English
License This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
https://creativecommons.org/licenses/by/4.0
cc-by
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c337t-10c03c07583c53b06a2721bfe08a80777f7c18d86b0157524759665a6ea3738c3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0003-4334-4797
OpenAccessLink https://proxy.k.utb.cz/login?url=https://downloads.hindawi.com/journals/misy/2022/4146042.pdf
PQID 2696740671
PQPubID 2048814
PageCount 7
ParticipantIDs unpaywall_primary_10_1155_2022_4146042
proquest_journals_2696740671
crossref_citationtrail_10_1155_2022_4146042
crossref_primary_10_1155_2022_4146042
hindawi_primary_10_1155_2022_4146042
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2022-07-21
PublicationDateYYYYMMDD 2022-07-21
PublicationDate_xml – month: 07
  year: 2022
  text: 2022-07-21
  day: 21
PublicationDecade 2020
PublicationPlace Amsterdam
PublicationPlace_xml – name: Amsterdam
PublicationTitle Mobile information systems
PublicationYear 2022
Publisher Hindawi
John Wiley & Sons, Inc
Publisher_xml – name: Hindawi
– name: John Wiley & Sons, Inc
References 12
13
14
Y. Cui (5) 2018; 85
G. Yu (7) 2020; 40
15
16
17
19
S. Diab (11) 2019; 16
G. Cao (20) 2021; 12
1
2
3
4
6
8
9
P. Barthakur (18) 2015; 17
10
References_xml – ident: 3
  doi: 10.1007/978-3-662-46463-2_36
– ident: 14
  doi: 10.1155/2022/8933468
– ident: 13
  doi: 10.1186/s13174-014-0010-4
– volume: 40
  start-page: 1
  issue: 3
  year: 2020
  ident: 7
  article-title: Research on computer network information security based on improved machine learning
  publication-title: Journal of Intelligent and Fuzzy system software
– ident: 8
  doi: 10.1155/2020/8886877
– ident: 19
  doi: 10.32628/cseit206444
– ident: 17
  doi: 10.1007/s10479-014-1775-3
– volume: 85
  start-page: 107
  year: 2018
  ident: 5
  article-title: Research on data fusion algorithm and anti-collision algorithm based on internet of things - sciencedirect
  publication-title: Future Generation Computer system software
  doi: 10.1016/j.future.2018.03.016
– ident: 1
  doi: 10.4028/www.scientific.net/kem.693.1391
– volume: 16
  start-page: 155
  issue: 12
  year: 2019
  ident: 11
  article-title: Optimizing stochastic gradient descent in text classification based on fine-tuning hyper-parameters approach. a case study on automatic classification of global terrorist attacks
  publication-title: International Journal of Computer Science and Information Security
– ident: 12
  doi: 10.12733/jics20105271
– ident: 2
  doi: 10.2174/1874444301507011834
– ident: 6
  doi: 10.1007/s00521-019-04571-5
– volume: 12
  start-page: 183
  year: 2021
  ident: 20
  article-title: Segmentation of intracerebral hemorrhage based on improved u-net
  publication-title: Journal of Imaging Science and Technology
– ident: 15
  doi: 10.1007/978-3-319-11218-3_29
– ident: 4
  doi: 10.13089/jkiisc.2016.26.4.903
– ident: 16
  doi: 10.1016/s1353-4858(19)30050-9
– ident: 9
  doi: 10.13052/jsn2445-9739.2016.010
– ident: 10
  doi: 10.3233/jifs-179518
– volume: 17
  start-page: 522
  issue: 5
  year: 2015
  ident: 18
  article-title: Adoption of a fuzzy based classification model for p2p botnet detection
  publication-title: International Journal on Network Security
SSID ssj0060357
ssib050733852
Score 2.2693632
Snippet In order to accurately predict the security situation of Internet of Things information network, a research method based on machine learning algorithm for...
SourceID unpaywall
proquest
crossref
hindawi
SourceType Open Access Repository
Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 1
SubjectTerms Algorithms
Artificial intelligence
Automation
Cards
Discriminant analysis
False alarms
Information management
Internet of Things
Machine learning
Monitoring
Neural networks
Perception
Posture
Security
Short message service
Situational awareness
Software
SummonAdditionalLinks – databaseName: Hindawi Publishing Open Access
  dbid: RHX
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1bS8MwFA46EH3xLk6n5GH6IsW2aZL2cYpjCNuDc9C3kqbZRWo3XMfw33vSpsMpXh4Lpymck-R8X3ryHYSanhSEDZljBSpOLC9wfUsoGmt5bQC8rnSp0ESx22OdgfcY0tCIJM2__8KHbKfpuXvrwYqG-bWJNn2mK7eeOmE1bajuO1hcAS43YGaTQuDToVwXWPCwqnf_MtZaJtoaawq8nKwBze1FNhPvS5Gmn3JOex_tGrCIW2V0D9CGyg7RXtWIAZt1eYReynM9lePpEJedOLG5Z6T9jntlrTfum2Z1uD_JF-YUELeW-j4YbHj4DjJagsG-W1RYKmzEV0e4lY6m8OL4dX6MBu2H5_uOZZooWJIQnsM2K20iARj4RFIS20y4QPriobJ94duc8yGXjp_4LAZgwKmr9f8Yo4IpoUWPJDlBtWyaqVOE4UkEHueJUMCqExlIh8cKKCZPfOrJoI5uKodG0iiM60YXaVQwDUoj7f7IuL-OrlbWs1JZ4we7ponNH2aNKnCRWYbzyGUB4wBZuFNH16tg_jrO2f8-d4529KM-5XWdBqrlbwt1AfAkjy-LyfkB9U7Xtg
  priority: 102
  providerName: Hindawi Publishing
Title Internet of Things Information Network Security Situational Awareness Based on Machine Learning Algorithms
URI https://dx.doi.org/10.1155/2022/4146042
https://www.proquest.com/docview/2696740671
https://downloads.hindawi.com/journals/misy/2022/4146042.pdf
UnpaywallVersion publishedVersion
Volume 2022
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAFT
  databaseName: Colorado Digital library
  customDbUrl:
  eissn: 1875-905X
  dateEnd: 20240530
  omitProxy: true
  ssIdentifier: ssj0060357
  issn: 1875-905X
  databaseCode: KQ8
  dateStart: 20050101
  isFulltext: true
  titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html
  providerName: Colorado Alliance of Research Libraries
– providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 1875-905X
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssib050733852
  issn: 1574-017X
  databaseCode: M~E
  dateStart: 20050101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
– providerCode: PRVWIB
  databaseName: Wiley Online Library Open Access
  customDbUrl:
  eissn: 1875-905X
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0060357
  issn: 1875-905X
  databaseCode: 24P
  dateStart: 20050101
  isFulltext: true
  titleUrlDefault: https://authorservices.wiley.com/open-science/open-access/browse-journals.html
  providerName: Wiley-Blackwell
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3dT9swED9B0TRe6IAhOjrkB-BlSsmX7UTipUxD1RAVH6sUHlDk2A5fpa3WVBX89ZwbB61I2xAvUSxdHNt3tn9nnX8HsBNKEbCceU6sM-WEsR85QtPM0Gsj4PWlT4VxFE-6rNMLfyY0WYCD6i6MMhTxQ6HGrRvjk05vZ6u1HdfxPvb90fjr_n6IUxwNrjVS-SIsMYpIvAZLve5p-3JGkcpNcAVPzDtCcid2aVLFvVM6V8XcjvTB_nYOcH6cDEbicSr6_T_2nqM6XFWtLkNO7luTImvJp1eEju_t1idYsaCUtEsrWoUFPViDepXwgdj5vw535fmhLsgwJ2XGT2LvMxn9km4ZU04ubFI8cnFbTOxpI2lPzb0zXFjJIe6ciqD8ySySUxNL8npN2v3rIX548zD-DL2jH7--dxybrMGRQcALXM6lG0gEIFEgaZC5TPjoXGa5diMRuZzznEsvUhHLEIBw6hueQcaoYFoYciUZbEBtMBzoTSBYEnHIuRIavXclY-nxTKMry1VEQxk34FulsFRaJnOTUKOfzjwaSlMzlKkdygbsvkiPSgaPv8jtWN38R6xZGUZa6S_1Wcw4QiPuNWDvxVj-Wc-XtwpuwbIpmvNk32tCrfg90V8RCBXZNiwen0X4PO8k29b2nwEkkQNo
linkProvider Unpaywall
linkToUnpaywall http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LSwMxEB60InrxLdYXOagX2bqvJLvgpYoigkXQQj3Ikk2yvmpb7Jaiv95JNytW8IG3DcxmN5lJ8s0w-QZgJ5QiYBnznFinygljP3KEpqmh10bA60ufCuMoXjTYWTM8b9HWBByWd2GUoYjvCtWv3RufdPgw2q3tvPYPcOyvxl_3D0Jc4mhwtZ7KJmGKUUTiFZhqNi7rNyOKVG6SK3jLPCMkd2KXtsq8d0rHuhg7kabtZ8cA58yg0xOvQ9Fufzp7TufhtvzrIuXkqTbI05p8-0Lo-N9hLcCcBaWkXljRIkzozhLMlwUfiF3_y_BYxA91TroZKSp-EnufyeiXNIqccnJli-KRq4d8YKONpD40985wYyVHeHIqgvIXo0xOTSzJ6x2pt--6-OL9c38Fmqcn18dnji3W4Mgg4Dlu59INJAKQKJA0SF0mfHQu00y7kYhcznnGpRepiKUIQDj1Dc8gY1QwLQy5kgxWodLpdvQaEGyJOORcCY3eu5Kx9Hiq0ZXlKqKhjKuwXyoskZbJ3BTUaCcjj4bSxExlYqeyCrsf0r2CweMbuR2rm1_ENkvDSEr9JT6LGUdoxL0q7H0Yy4_9rP9VcANmTdPEk31vEyr5y0BvIRDK021r7-8NOgFg
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Internet+of+Things+Information+Network+Security+Situational+Awareness+Based+on+Machine+Learning+Algorithms&rft.jtitle=Mobile+information+systems&rft.au=Meng%2C+Lei&rft.date=2022-07-21&rft.pub=Hindawi&rft.issn=1574-017X&rft.eissn=1875-905X&rft.volume=2022&rft_id=info:doi/10.1155%2F2022%2F4146042&rft.externalDocID=10_1155_2022_4146042
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1574-017X&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1574-017X&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1574-017X&client=summon