• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

一种基于边缘计算的网络流量分析与入侵检测集成框架,用于增强工业物联网中信息物理系统的安全性。

An Edge-Computing-Based Integrated Framework for Network Traffic Analysis and Intrusion Detection to Enhance Cyber-Physical System Security in Industrial IoT.

作者信息

Zhukabayeva Tamara, Ahmad Zulfiqar, Adamova Aigul, Karabayev Nurdaulet, Abdildayeva Assel

机构信息

Department of Information Systems, L.N. Gumilyov Eurasian National University, Astana 010000, Kazakhstan.

Department of Computer Engineering, Astana IT University, Astana 010000, Kazakhstan.

出版信息

Sensors (Basel). 2025 Apr 10;25(8):2395. doi: 10.3390/s25082395.

DOI:10.3390/s25082395
PMID:40285085
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC12031334/
Abstract

Industrial Internet of things (IIoT) environments need to implement reliable security measures because of the growth in network traffic and overall connectivity. Accordingly, this work provides the architecture of network traffic analysis and the detection of intrusions in a network with the help of edge computing and using machine-learning methods. The study uses k-means and DBSCAN techniques to examine the flow of traffic in a network and to discover several groups of behavior and possible anomalies. An assessment of the two clustering methods shows that K-means achieves a silhouette score of 0.612, while DBSCAN achieves 0.473. For intrusion detection, k-nearest neighbors (KNN), random forest (RF), and logistic regression (LR) were used and evaluated. The analysis revealed that both KNN and RF yielded seamless results in terms of precision, recall, and F1 score, close to the maximum possible value of 1.00, as demonstrated by both ROC and precision-recall curves. Accuracy matrices show that RF had better precision and recall for both benign and attacks, while KNN and LR had good detection with slight fluctuations. With the integration of edge computing, the framework is improved by real-time data processing, which means a lower latency of the security system. This work enriches the knowledge of the IIOT by offering a detailed solution to the issue of cybersecurity in IoT systems, based on well-grounded performance assessments and the right implementation of current technologies. The results thus support the effectiveness of the proposed framework to improve security and provide tangible improvements over current approaches by identifying potential threats within a network.

摘要

由于网络流量和整体连接性的增长,工业物联网(IIoT)环境需要实施可靠的安全措施。因此,这项工作借助边缘计算并使用机器学习方法,提供了网络流量分析和网络入侵检测的架构。该研究使用k均值和DBSCAN技术来检查网络中的流量,并发现几组行为和可能的异常情况。对这两种聚类方法的评估表明,k均值的轮廓系数为0.612,而DBSCAN为0.473。对于入侵检测,使用并评估了k近邻(KNN)、随机森林(RF)和逻辑回归(LR)。分析表明,KNN和RF在精确率、召回率和F1分数方面都产生了无缝结果,接近最大可能值1.00,ROC曲线和精确率-召回率曲线都证明了这一点。准确率矩阵表明,RF在良性和攻击方面都有更好的精确率和召回率,而KNN和LR在检测方面有良好表现,但有轻微波动。通过集成边缘计算,该框架通过实时数据处理得到了改进,这意味着安全系统的延迟更低。这项工作通过基于有充分依据的性能评估和当前技术的正确实施,为物联网系统中的网络安全问题提供了详细解决方案,丰富了工业物联网的知识。因此,结果支持了所提出框架在提高安全性方面的有效性,并通过识别网络内的潜在威胁,比当前方法有切实的改进。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d427/12031334/f251366a3257/sensors-25-02395-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d427/12031334/38cc4abda985/sensors-25-02395-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d427/12031334/e641a0c6c5b5/sensors-25-02395-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d427/12031334/f4f232316839/sensors-25-02395-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d427/12031334/f96cc3dbbff4/sensors-25-02395-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d427/12031334/601bd9baaaca/sensors-25-02395-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d427/12031334/970aba0ba938/sensors-25-02395-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d427/12031334/38412301e11d/sensors-25-02395-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d427/12031334/cb2bc5489357/sensors-25-02395-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d427/12031334/c97b0f0930ec/sensors-25-02395-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d427/12031334/f251366a3257/sensors-25-02395-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d427/12031334/38cc4abda985/sensors-25-02395-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d427/12031334/e641a0c6c5b5/sensors-25-02395-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d427/12031334/f4f232316839/sensors-25-02395-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d427/12031334/f96cc3dbbff4/sensors-25-02395-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d427/12031334/601bd9baaaca/sensors-25-02395-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d427/12031334/970aba0ba938/sensors-25-02395-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d427/12031334/38412301e11d/sensors-25-02395-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d427/12031334/cb2bc5489357/sensors-25-02395-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d427/12031334/c97b0f0930ec/sensors-25-02395-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d427/12031334/f251366a3257/sensors-25-02395-g010.jpg

相似文献

1
An Edge-Computing-Based Integrated Framework for Network Traffic Analysis and Intrusion Detection to Enhance Cyber-Physical System Security in Industrial IoT.一种基于边缘计算的网络流量分析与入侵检测集成框架,用于增强工业物联网中信息物理系统的安全性。
Sensors (Basel). 2025 Apr 10;25(8):2395. doi: 10.3390/s25082395.
2
A hybrid AI based framework for enhancing security in satellite based IoT networks using high performance computing architecture.一种基于混合人工智能的框架,用于使用高性能计算架构增强基于卫星的物联网网络的安全性。
Sci Rep. 2024 Dec 28;14(1):30695. doi: 10.1038/s41598-024-78262-0.
3
FFL-IDS: A Fog-Enabled Federated Learning-Based Intrusion Detection System to Counter Jamming and Spoofing Attacks for the Industrial Internet of Things.FFL-IDS:一种基于雾计算的联邦学习入侵检测系统,用于应对工业物联网中的干扰和欺骗攻击。
Sensors (Basel). 2024 Dec 24;25(1):10. doi: 10.3390/s25010010.
4
Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices.基于软件定义网络的一对多策略,用于检测和缓解智能家居物联网设备中的分布式拒绝服务攻击
Sensors (Basel). 2024 Aug 3;24(15):5022. doi: 10.3390/s24155022.
5
ROAST-IoT: A Novel Range-Optimized Attention Convolutional Scattered Technique for Intrusion Detection in IoT Networks.ROAST-IoT:一种用于物联网网络入侵检测的新型距离优化注意力卷积散射技术。
Sensors (Basel). 2023 Sep 23;23(19):8044. doi: 10.3390/s23198044.
6
A Survey on Industrial Internet of Things Security: Requirements, Attacks, AI-Based Solutions, and Edge Computing Opportunities.工业物联网安全综述:需求、攻击、基于人工智能的解决方案及边缘计算机遇
Sensors (Basel). 2023 Aug 28;23(17):7470. doi: 10.3390/s23177470.
7
Adaptive Machine Learning Based Distributed Denial-of-Services Attacks Detection and Mitigation System for SDN-Enabled IoT.基于自适应机器学习的支持软件定义网络的物联网分布式拒绝服务攻击检测与缓解系统
Sensors (Basel). 2022 Mar 31;22(7):2697. doi: 10.3390/s22072697.
8
Cybersecurity Solutions for Industrial Internet of Things-Edge Computing Integration: Challenges, Threats, and Future Directions.工业物联网与边缘计算集成的网络安全解决方案:挑战、威胁与未来方向
Sensors (Basel). 2025 Jan 2;25(1):213. doi: 10.3390/s25010213.
9
Ensemble technique of intrusion detection for IoT-edge platform.物联网边缘平台的入侵检测集成技术
Sci Rep. 2024 May 22;14(1):11703. doi: 10.1038/s41598-024-62435-y.
10
A Scalable Approach to Internet of Things and Industrial Internet of Things Security: Evaluating Adaptive Self-Adjusting Memory K-Nearest Neighbor for Zero-Day Attack Detection.一种适用于物联网和工业物联网安全的可扩展方法:评估用于零日攻击检测的自适应自调整内存K近邻算法
Sensors (Basel). 2025 Jan 2;25(1):216. doi: 10.3390/s25010216.

本文引用的文献

1
Securing Industrial Control Systems: Components, Cyber Threats, and Machine Learning-Driven Defense Strategies.保障工业控制系统安全:组件、网络威胁及机器学习驱动的防御策略
Sensors (Basel). 2023 Oct 30;23(21):8840. doi: 10.3390/s23218840.
2
A Survey on Industrial Internet of Things Security: Requirements, Attacks, AI-Based Solutions, and Edge Computing Opportunities.工业物联网安全综述:需求、攻击、基于人工智能的解决方案及边缘计算机遇
Sensors (Basel). 2023 Aug 28;23(17):7470. doi: 10.3390/s23177470.
3
Performance of Machine Learning-Based Multi-Model Voting Ensemble Methods for Network Threat Detection in Agriculture 4.0.
基于机器学习的多模型投票集成方法在农业 4.0 网络威胁检测中的性能。
Sensors (Basel). 2021 Nov 10;21(22):7475. doi: 10.3390/s21227475.
4
LoRaWAN Gateway Placement Model for Dynamic Internet of Things Scenarios.适用于动态物联网场景的 LoRaWAN 网关放置模型。
Sensors (Basel). 2020 Aug 4;20(15):4336. doi: 10.3390/s20154336.