• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

SALT:基于迁移学习的智能家居攻击检测威胁模型。

SALT: transfer learning-based threat model for attack detection in smart home.

机构信息

Department of Computer Science and Information Technology, Central University of Jammu, Rahya Suchani, Jammu and Kashmir, 181143, India.

Leaders Institute, Woolloongabba, Brisbane, QLD, -4102, Australia.

出版信息

Sci Rep. 2022 Jul 18;12(1):12247. doi: 10.1038/s41598-022-16261-9.

DOI:10.1038/s41598-022-16261-9
PMID:35851092
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC9293907/
Abstract

The next whooping revolution after the Internet is its scion, the Internet of Things (IoT), which has facilitated every entity the power to connect to the web. However, this magnifying depth of the digital pool oil the wheels for the attackers to penetrate. Thus, these threats and attacks have become a prime concern among researchers. With promising features, Machine Learning (ML) has been the solution throughout to detect these threats. But, the general ML-based solutions have been declining with the practical implementation to detect unknown threats due to changes in domains, different distributions, long training time, and lack of labelled data. To tackle the aforementioned issues, Transfer Learning (TL) has emerged as a viable solution. Motivated by the facts, this article aims to leverage TL-based strategies to get better the learning classifiers to detect known and unknown threats targeting IoT systems. TL transfers the knowledge attained while learning a task to expedite the learning of new similar tasks/problems. This article proposes a learning-based threat model for attack detection in the Smart Home environment (SALT). It uses the knowledge of known threats in the source domain (labelled data) to detect the unknown threats in the target domain (unlabelled data). The proposed scheme addresses the workable differences in feature space distribution or the ratio of attack instances to a normal one, or both. The proposed threat model would show the implying competence of ML with the TL scheme to improve the robustness of learning classifiers besides the threat variants to detect known and unknown threats. The performance analysis shows that traditional schemes underperform for unknown threat variants with accuracy dropping to 39% and recall to 56.

摘要

继互联网之后,下一个重大变革是其分支物联网 (IoT),它使每个实体都具有连接互联网的能力。然而,这极大地加深了数字领域的深度,为攻击者提供了可乘之机。因此,这些威胁和攻击已经成为研究人员关注的首要问题。机器学习 (ML) 具有广阔的前景,它是检测这些威胁的主要手段。但是,由于域的变化、不同的分布、长时间的训练以及缺乏标记数据,基于通用 ML 的解决方案在实际实施中对于检测未知威胁的效果逐渐下降。为了解决上述问题,迁移学习 (TL) 已经成为一种可行的解决方案。受此启发,本文旨在利用基于 TL 的策略来改进学习分类器,以检测针对物联网系统的已知和未知威胁。TL 将在学习任务中获得的知识转移到加速新的类似任务/问题的学习中。本文提出了一种基于学习的智能家居环境 (SALT) 攻击检测威胁模型。它利用源域(标记数据)中已知威胁的知识来检测目标域(未标记数据)中的未知威胁。所提出的方案解决了特征空间分布或攻击实例与正常实例的比例或两者之间的差异。所提出的威胁模型将展示 ML 与 TL 方案相结合的可行性,以提高学习分类器的鲁棒性,同时还可以检测已知和未知的威胁变体。性能分析表明,传统方案对于未知威胁变体的性能较差,准确率下降到 39%,召回率下降到 56%。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/32b7/9293907/00168d9a4910/41598_2022_16261_Fig12_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/32b7/9293907/a1bbadb163bc/41598_2022_16261_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/32b7/9293907/bc888420eecd/41598_2022_16261_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/32b7/9293907/aa1309cc6c2a/41598_2022_16261_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/32b7/9293907/c4e8664f2eae/41598_2022_16261_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/32b7/9293907/3ed9e04854f5/41598_2022_16261_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/32b7/9293907/4cd254c4d58b/41598_2022_16261_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/32b7/9293907/3dd9f1f1c469/41598_2022_16261_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/32b7/9293907/b38ab08c328b/41598_2022_16261_Fig8_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/32b7/9293907/968a7dfd59c3/41598_2022_16261_Fig9_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/32b7/9293907/925c6685bb89/41598_2022_16261_Fig10_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/32b7/9293907/d9f8b49a4347/41598_2022_16261_Fig11_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/32b7/9293907/00168d9a4910/41598_2022_16261_Fig12_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/32b7/9293907/a1bbadb163bc/41598_2022_16261_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/32b7/9293907/bc888420eecd/41598_2022_16261_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/32b7/9293907/aa1309cc6c2a/41598_2022_16261_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/32b7/9293907/c4e8664f2eae/41598_2022_16261_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/32b7/9293907/3ed9e04854f5/41598_2022_16261_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/32b7/9293907/4cd254c4d58b/41598_2022_16261_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/32b7/9293907/3dd9f1f1c469/41598_2022_16261_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/32b7/9293907/b38ab08c328b/41598_2022_16261_Fig8_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/32b7/9293907/968a7dfd59c3/41598_2022_16261_Fig9_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/32b7/9293907/925c6685bb89/41598_2022_16261_Fig10_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/32b7/9293907/d9f8b49a4347/41598_2022_16261_Fig11_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/32b7/9293907/00168d9a4910/41598_2022_16261_Fig12_HTML.jpg

相似文献

1
SALT: transfer learning-based threat model for attack detection in smart home.SALT:基于迁移学习的智能家居攻击检测威胁模型。
Sci Rep. 2022 Jul 18;12(1):12247. doi: 10.1038/s41598-022-16261-9.
2
Identifying and Mitigating Phishing Attack Threats in IoT Use Cases Using a Threat Modelling Approach.利用威胁建模方法识别和缓解物联网用例中的网络钓鱼攻击威胁。
Sensors (Basel). 2021 Jul 14;21(14):4816. doi: 10.3390/s21144816.
3
An Aggregated Mutual Information Based Feature Selection with Machine Learning Methods for Enhancing IoT Botnet Attack Detection.基于聚合互信息的特征选择与机器学习方法在增强物联网僵尸网络攻击检测中的应用。
Sensors (Basel). 2021 Dec 28;22(1):185. doi: 10.3390/s22010185.
4
Cyberattacks Detection in IoT-Based Smart City Applications Using Machine Learning Techniques.基于机器学习技术的物联网智慧城市应用中的网络攻击检测。
Int J Environ Res Public Health. 2020 Dec 14;17(24):9347. doi: 10.3390/ijerph17249347.
5
Transfer-Learning-Based Intrusion Detection Framework in IoT Networks.基于迁移学习的物联网网络入侵检测框架。
Sensors (Basel). 2022 Jul 27;22(15):5621. doi: 10.3390/s22155621.
6
Adaptive Machine Learning Based Distributed Denial-of-Services Attacks Detection and Mitigation System for SDN-Enabled IoT.基于自适应机器学习的支持软件定义网络的物联网分布式拒绝服务攻击检测与缓解系统
Sensors (Basel). 2022 Mar 31;22(7):2697. doi: 10.3390/s22072697.
7
Lightweight Internet of Things Botnet Detection Using One-Class Classification.基于单类分类的轻量级物联网僵尸网络检测。
Sensors (Basel). 2022 May 10;22(10):3646. doi: 10.3390/s22103646.
8
Detection of Malicious Cloud Bandwidth Consumption in Cloud Computing Using Machine Learning Techniques.利用机器学习技术检测云计算中的恶意带宽消耗。
Comput Intell Neurosci. 2022 Sep 5;2022:4003403. doi: 10.1155/2022/4003403. eCollection 2022.
9
HDL-IDS: A Hybrid Deep Learning Architecture for Intrusion Detection in the Internet of Vehicles.HDL-IDS:一种用于车联网入侵检测的混合深度学习架构。
Sensors (Basel). 2022 Feb 10;22(4):1340. doi: 10.3390/s22041340.
10
FamilyGuard: A Security Architecture for Anomaly Detection in Home Networks.家庭卫士:家庭网络异常检测的安全架构。
Sensors (Basel). 2022 Apr 9;22(8):2895. doi: 10.3390/s22082895.

引用本文的文献

1
AI powered blockchain framework for predictive temperature control in smart homes using wireless sensor networks and time shifted analysis.用于智能家居中基于无线传感器网络和时移分析的预测性温度控制的人工智能驱动的区块链框架。
Sci Rep. 2025 May 25;15(1):18168. doi: 10.1038/s41598-025-03146-w.
2
Secure IoT data dissemination with blockchain and transfer learning techniques.利用区块链和迁移学习技术实现安全的物联网数据传播。
Sci Rep. 2025 Jan 11;15(1):1665. doi: 10.1038/s41598-024-84837-8.
3
Threat Modeling for Communication Security of IoT-Enabled Digital Logistics.
面向物联网数字物流通信安全的威胁建模
Sensors (Basel). 2023 Nov 29;23(23):9500. doi: 10.3390/s23239500.