• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于特征波动的异常流量检测用于安全的工业物联网

Anomaly traffic detection based on feature fluctuation for secure industrial internet of things.

作者信息

Yin Jie, Zhang Chuntang, Xie Wenwei, Liang Guangjun, Zhang Lanping, Gui Guan

机构信息

Computer Information and Cyber Security, Jiangsu Police Institute, Nanjing, 210031 China.

Bell Honors School, Nanjing University of Posts and Telecommunications, Nanjing, 210023 China.

出版信息

Peer Peer Netw Appl. 2023 Apr 26:1-16. doi: 10.1007/s12083-023-01482-0.

DOI:10.1007/s12083-023-01482-0
PMID:37362098
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC10131526/
Abstract

The detection of anomaly traffic in internet of things (IoT) is mainly based on the original binary data at the traffic packet level and the structured data at the session flow level. This kind of dataset has a single feature extraction method and relies on prior manual knowledge. It is easy to lose critical information during data processing, which reduces the validity and robustness of the dataset. In this paper, we first construct a new anomaly traffic dataset based on the traffic packet and session flow data in the Iot-23 dataset. Second, we propose a feature extraction method based on feature fluctuation. Our proposed method can effectively solve the disadvantage that the data collected in different scenarios have different characteristics, which leads to the feature containing less information. Compared with the traditional anomaly traffic detection model, experiments show that our proposed method based on feature fluctuation has stronger robustness, can improve the accuracy of anomaly traffic detection and the generalization ability of the traditional model, and is more conducive to the detection of anomalous traffic in IoT.

摘要

物联网(IoT)中异常流量的检测主要基于流量数据包级别的原始二进制数据和会话流级别的结构化数据。这类数据集具有单一的特征提取方法,且依赖于先验的人工知识。在数据处理过程中很容易丢失关键信息,这降低了数据集的有效性和鲁棒性。在本文中,我们首先基于Iot - 23数据集中的流量数据包和会话流数据构建了一个新的异常流量数据集。其次,我们提出了一种基于特征波动的特征提取方法。我们提出的方法能够有效解决不同场景下收集的数据具有不同特征,导致特征包含信息较少的缺点。与传统的异常流量检测模型相比,实验表明我们提出的基于特征波动的方法具有更强的鲁棒性,能够提高异常流量检测的准确率以及传统模型的泛化能力,更有利于物联网中异常流量的检测。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3ba6/10131526/5fa0a8a5ac4a/12083_2023_1482_Fig14_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3ba6/10131526/2c0f0c505ddf/12083_2023_1482_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3ba6/10131526/4aa63e4347c1/12083_2023_1482_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3ba6/10131526/9840ec1cd8d9/12083_2023_1482_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3ba6/10131526/b5b4dff29d52/12083_2023_1482_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3ba6/10131526/5d86cddbdbe5/12083_2023_1482_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3ba6/10131526/3a8ced657f92/12083_2023_1482_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3ba6/10131526/11ac16711d36/12083_2023_1482_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3ba6/10131526/ab27b247125a/12083_2023_1482_Fig8_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3ba6/10131526/7bbf6436d897/12083_2023_1482_Fig9_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3ba6/10131526/e2a1d1a5ea1b/12083_2023_1482_Fig10_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3ba6/10131526/429a50cf555c/12083_2023_1482_Fig11_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3ba6/10131526/dbf15bc53cc5/12083_2023_1482_Fig12_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3ba6/10131526/88da4fc0b21a/12083_2023_1482_Fig13_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3ba6/10131526/5fa0a8a5ac4a/12083_2023_1482_Fig14_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3ba6/10131526/2c0f0c505ddf/12083_2023_1482_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3ba6/10131526/4aa63e4347c1/12083_2023_1482_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3ba6/10131526/9840ec1cd8d9/12083_2023_1482_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3ba6/10131526/b5b4dff29d52/12083_2023_1482_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3ba6/10131526/5d86cddbdbe5/12083_2023_1482_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3ba6/10131526/3a8ced657f92/12083_2023_1482_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3ba6/10131526/11ac16711d36/12083_2023_1482_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3ba6/10131526/ab27b247125a/12083_2023_1482_Fig8_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3ba6/10131526/7bbf6436d897/12083_2023_1482_Fig9_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3ba6/10131526/e2a1d1a5ea1b/12083_2023_1482_Fig10_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3ba6/10131526/429a50cf555c/12083_2023_1482_Fig11_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3ba6/10131526/dbf15bc53cc5/12083_2023_1482_Fig12_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3ba6/10131526/88da4fc0b21a/12083_2023_1482_Fig13_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3ba6/10131526/5fa0a8a5ac4a/12083_2023_1482_Fig14_HTML.jpg

相似文献

1
Anomaly traffic detection based on feature fluctuation for secure industrial internet of things.基于特征波动的异常流量检测用于安全的工业物联网
Peer Peer Netw Appl. 2023 Apr 26:1-16. doi: 10.1007/s12083-023-01482-0.
2
An effective method for anomaly detection in industrial Internet of Things using XGBoost and LSTM.一种使用XGBoost和长短期记忆网络(LSTM)在工业物联网中进行异常检测的有效方法。
Sci Rep. 2024 Oct 14;14(1):23969. doi: 10.1038/s41598-024-74822-6.
3
Research on Anomaly Network Detection Based on Self-Attention Mechanism.基于自注意力机制的异常网络检测研究。
Sensors (Basel). 2023 May 25;23(11):5059. doi: 10.3390/s23115059.
4
IoT Device Identification Using Directional Packet Length Sequences and 1D-CNN.基于定向数据包长度序列和一维卷积神经网络的物联网设备识别
Sensors (Basel). 2022 Oct 30;22(21):8337. doi: 10.3390/s22218337.
5
An Aggregated Mutual Information Based Feature Selection with Machine Learning Methods for Enhancing IoT Botnet Attack Detection.基于聚合互信息的特征选择与机器学习方法在增强物联网僵尸网络攻击检测中的应用。
Sensors (Basel). 2021 Dec 28;22(1):185. doi: 10.3390/s22010185.
6
DOC-IDS: A Deep Learning-Based Method for Feature Extraction and Anomaly Detection in Network Traffic.文档 ID:一种基于深度学习的网络流量特征提取和异常检测方法。
Sensors (Basel). 2022 Jun 10;22(12):4405. doi: 10.3390/s22124405.
7
Towards Developing a Robust Intrusion Detection Model Using Hadoop-Spark and Data Augmentation for IoT Networks.面向使用Hadoop-Spark和数据增强技术为物联网网络开发一个强大的入侵检测模型。
Sensors (Basel). 2022 Oct 12;22(20):7726. doi: 10.3390/s22207726.
8
A Comprehensive Study of Anomaly Detection Schemes in IoT Networks Using Machine Learning Algorithms.基于机器学习算法的物联网网络异常检测方案的综合研究。
Sensors (Basel). 2021 Dec 13;21(24):8320. doi: 10.3390/s21248320.
9
Automated IoT Device Identification Based on Full Packet Information Using Real-Time Network Traffic.基于实时网络流量全数据包信息的自动化物联网设备识别
Sensors (Basel). 2021 Apr 10;21(8):2660. doi: 10.3390/s21082660.
10
Using Embedded Feature Selection and CNN for Classification on CCD-INID-V1-A New IoT Dataset.利用嵌入式特征选择和卷积神经网络对 CCD-INID-V1-新物联网数据集进行分类。
Sensors (Basel). 2021 Jul 15;21(14):4834. doi: 10.3390/s21144834.

引用本文的文献

1
Research on a Critical Link Discovery Method for Network Security Situational Awareness.网络安全态势感知关键链路发现方法研究
Entropy (Basel). 2024 Apr 4;26(4):315. doi: 10.3390/e26040315.