• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于区块链的工业物联网环境中早期僵尸网络检测的安全数字孪生框架。

A Blockchain-Enabled Secure Digital Twin Framework for Early Botnet Detection in IIoT Environment.

机构信息

Department of Computer Science and Engineering, Seoul National University of Science and Technology (SeoulTech), Seoul 01811, Korea.

出版信息

Sensors (Basel). 2022 Aug 16;22(16):6133. doi: 10.3390/s22166133.

DOI:10.3390/s22166133
PMID:36015892
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC9412983/
Abstract

Resource constraints in the Industrial Internet of Things (IIoT) result in brute-force attacks, transforming them into a botnet to launch Distributed Denial of Service Attacks. The delayed detection of botnet formation presents challenges in controlling the spread of malicious scripts in other devices and increases the probability of a high-volume cyberattack. In this paper, we propose a secure Blockchain-enabled Digital Framework for the early detection of Bot formation in a Smart Factory environment. A Digital Twin (DT) is designed for a group of devices on the edge layer to collect device data and inspect packet headers using Deep Learning for connections with external unique IP addresses with open connections. Data are synchronized between the DT and a Packet Auditor (PA) for detecting corrupt device data transmission. Smart Contracts authenticate the DT and PA, ensuring malicious nodes do not participate in data synchronization. Botnet spread is prevented using DT certificate revocation. A comparative analysis of the proposed framework with existing studies demonstrates that the synchronization of data between the DT and PA ensures data integrity for the Botnet detection model training. Data privacy is maintained by inspecting only Packet headers, thereby not requiring the decryption of encrypted data.

摘要

工业物联网 (IIoT) 中的资源限制导致暴力攻击,将其转化为僵尸网络以发起分布式拒绝服务攻击。僵尸网络形成的延迟检测给控制其他设备中恶意脚本的传播带来了挑战,并增加了大规模网络攻击的可能性。在本文中,我们提出了一个安全的区块链支持的数字框架,用于在智能工厂环境中早期检测 Bot 形成。为边缘层上的一组设备设计了一个数字孪生 (DT),以使用深度学习收集设备数据并检查数据包头,以查找具有开放连接的外部唯一 IP 地址的连接。数据在 DT 和数据包审核器 (PA) 之间进行同步,以检测损坏的设备数据传输。智能合约对 DT 和 PA 进行身份验证,确保恶意节点不参与数据同步。使用 DT 证书吊销来防止僵尸网络的传播。通过与现有研究的比较分析,证明了 DT 和 PA 之间的数据同步确保了 Botnet 检测模型训练的数据完整性。通过仅检查数据包头来维护数据隐私,因此不需要对加密数据进行解密。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f13e/9412983/779a4a23d2a0/sensors-22-06133-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f13e/9412983/95c3a97fe34b/sensors-22-06133-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f13e/9412983/e7f330d54c34/sensors-22-06133-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f13e/9412983/787987d2459d/sensors-22-06133-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f13e/9412983/70d40ce60713/sensors-22-06133-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f13e/9412983/84ebcc989900/sensors-22-06133-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f13e/9412983/9825721ea49d/sensors-22-06133-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f13e/9412983/12b6154bd39e/sensors-22-06133-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f13e/9412983/779a4a23d2a0/sensors-22-06133-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f13e/9412983/95c3a97fe34b/sensors-22-06133-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f13e/9412983/e7f330d54c34/sensors-22-06133-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f13e/9412983/787987d2459d/sensors-22-06133-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f13e/9412983/70d40ce60713/sensors-22-06133-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f13e/9412983/84ebcc989900/sensors-22-06133-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f13e/9412983/9825721ea49d/sensors-22-06133-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f13e/9412983/12b6154bd39e/sensors-22-06133-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f13e/9412983/779a4a23d2a0/sensors-22-06133-g008.jpg

相似文献

1
A Blockchain-Enabled Secure Digital Twin Framework for Early Botnet Detection in IIoT Environment.基于区块链的工业物联网环境中早期僵尸网络检测的安全数字孪生框架。
Sensors (Basel). 2022 Aug 16;22(16):6133. doi: 10.3390/s22166133.
2
A Lightweight Hybrid Deep Learning Privacy Preserving Model for FC-Based Industrial Internet of Medical Things.基于 FC 的工业医疗物联网的轻量级混合深度学习隐私保护模型。
Sensors (Basel). 2022 Mar 9;22(6):2112. doi: 10.3390/s22062112.
3
A Blockchain-Based Privacy Information Security Sharing Scheme in Industrial Internet of Things.基于区块链的工业物联网隐私信息安全共享方案。
Sensors (Basel). 2022 Apr 30;22(9):3426. doi: 10.3390/s22093426.
4
HealthLock: Blockchain-Based Privacy Preservation Using Homomorphic Encryption in Internet of Things Healthcare Applications.HealthLock:物联网医疗应用中基于同态加密的区块链隐私保护
Sensors (Basel). 2023 Jul 28;23(15):6762. doi: 10.3390/s23156762.
5
BEST-Blockchain-Enabled Secure and Trusted Public Emergency Services for Smart Cities Environment.基于区块链的智慧城市环境下安全可信的公共紧急服务
Sensors (Basel). 2022 Jul 31;22(15):5733. doi: 10.3390/s22155733.
6
A decentralized authentication scheme for smart factory based on blockchain.一种基于区块链的智能工厂去中心化认证方案。
Sci Rep. 2024 Oct 20;14(1):24640. doi: 10.1038/s41598-024-76065-x.
7
A Blockchain-Based Secure Image Encryption Scheme for the Industrial Internet of Things.一种用于工业物联网的基于区块链的安全图像加密方案。
Entropy (Basel). 2020 Feb 4;22(2):175. doi: 10.3390/e22020175.
8
DDoS Attack Prevention for Internet of Thing Devices Using Ethereum Blockchain Technology.利用以太坊区块链技术防止物联网设备的 DDoS 攻击。
Sensors (Basel). 2022 Sep 8;22(18):6806. doi: 10.3390/s22186806.
9
Classification of botnet attacks in IoT smart factory using honeypot combined with machine learning.基于蜜罐与机器学习的物联网智能工厂中僵尸网络攻击分类
PeerJ Comput Sci. 2021 Jan 25;7:e350. doi: 10.7717/peerj-cs.350. eCollection 2021.
10
Secure IIoT Information Reinforcement Model Based on IIoT Information Platform Using Blockchain.基于区块链的 IIoT 信息平台的安全 IIoT 信息强化模型。
Sensors (Basel). 2022 Jun 20;22(12):4645. doi: 10.3390/s22124645.

引用本文的文献

1
Systematic Literature Review of IoT Botnet DDOS Attacks and Evaluation of Detection Techniques.物联网僵尸网络分布式拒绝服务攻击的系统文献综述及检测技术评估
Sensors (Basel). 2024 Jun 1;24(11):3571. doi: 10.3390/s24113571.

本文引用的文献

1
A Blockchain-Based Privacy Information Security Sharing Scheme in Industrial Internet of Things.基于区块链的工业物联网隐私信息安全共享方案。
Sensors (Basel). 2022 Apr 30;22(9):3426. doi: 10.3390/s22093426.
2
Blockchain Based Solutions to Mitigate Distributed Denial of Service (DDoS) Attacks in the Internet of Things (IoT): A Survey.基于区块链的物联网(IoT)中减轻分布式拒绝服务(DDoS)攻击的解决方案:一项综述。
Sensors (Basel). 2022 Jan 31;22(3):1094. doi: 10.3390/s22031094.
3
Internet of Things for System Integrity: A Comprehensive Survey on Security, Attacks and Countermeasures for Industrial Applications.
物联网系统完整性:工业应用的安全性、攻击及对策的全面调查。
Sensors (Basel). 2021 May 24;21(11):3654. doi: 10.3390/s21113654.