期刊文献+

基于文件分时索引的大规模流量实时IoT终端识别算法 被引量:4

Real-Time IoT Terminal Identification Algorithm for Large-Scale Flow Based on Time-Sharing Index of Files
下载PDF
导出
摘要 随着5G时代的来临,诸如工业区,校园网等开放性园区网络中存在大量的物联网(Internet of Things,IoT)终端,IoT终端由于其数据流量巨大,伪造IoT终端进行网络攻击的问题日益严重.现有IoT终端识别技术在面对海量数据时计算资源的成本逐渐提高.针对以上问题,提出了基于文件分时索引的大规模流量实时IoT终端识别算法.首先,建立内存分时索引元数据;其次,使用文件的分时索引来存储构建会话的中间数据;最后,控制内存分时索引元数据触发从少量文件中提取特征并进行IoT终端识别.实验中,在不损失IoT终端识别算法精度条件下,仅消耗少量磁盘,可将内存消耗降低92%.实验结果表明,该技术能够用于实时IoT终端识别框架中. With the advent of the 5G era,there exist a large number of Internet of Things(IoT)terminals in the open campus network such as industrial area and campus network.Due to the huge data flow of IoT terminals,the problem of counterfeiting IoT terminals for network attack becomes increasingly serious,and the cost of computing resources of the existing IoT terminals identification technologies in the face of massive data increases gradually.To solve these problems,we propose a real-time IoT terminals identification algorithm for large-scale flow based on the time-sharing index of files.Firstly,the metadata for the time-sharing index of memory is established.Secondly,the time-sharing index of files is used to store the intermediate data of the construction session.Thirdly,the metadata trigger for the time-sharing index of memory is controlled to extract features from a small number of files and perform IoT terminals identification.In the experiment,on the premise of maintaining the accuracy of the IoT terminals identification algorithm,only a little disk space is occupied and the memory consumption is reduced by 92%.These results show that the proposed algorithm can be used in the framework of real-time IoT terminals identification.
作者 徐彭娜 彭行雄 XU Peng-Na;PENG Xing-Xiong(Alibaba Big Data Institute,Fuzhou Polytechnic,Fuzhou 350108,China;Network and Data Center,Fujian Normal University,Fuzhou 350117,China)
出处 《计算机系统应用》 2021年第2期207-212,共6页 Computer Systems & Applications
基金 福建省高校产学研合作科技计划重大项目(2016H6007)。
关键词 物联网(IoT) IoT终端识别 异常检测 网络流量 Internet of Thing(IoT) IoT terminals identification anomaly detection network flow
  • 相关文献

参考文献4

二级参考文献18

  • 1LEE Y M,,CHENG Feng,LEUNG Y T.Exploring the impact ofRFID on supply chain dynamics[].Proc of Winter Simulation Con-ference.2004
  • 2DELEN D,HARDGRAVE B C,SHARDA R.RFID for better sup-ply-chain management through enhanced information visibility[]..2007
  • 3HAKIMH,RENOUF R,ENDERLE J.Passive RFID asset monito-ring system in hospital environments[].Proc of the nd AnnualNortheast Conference Bioengineering.2006
  • 4SHARIQ R,JEFFERY S R,KRISHNAMURTHY S,et al.Events onthe edge[].Proc of SIGMOD.2005
  • 5LI Zhe-kun,GADN R,PRABHUB S.Applications of RFID techno-logy and smart parts in manufacturing[].Proc of DETCASMEDesign Engineering Technical Conferences and Computers and Infor-mation in Engineering Conference.2004
  • 6EUGENE W,YANLEI D,SHARIQ R.High-performance complexevent processing over streams[].Proc of SIGMOD.2006
  • 7CHANDRASEKARAN S,COOPER O,DESHPANDE A,et al.Tele-graphCQ:continuous dataflow processing[].Proc of SIGMOD.2003
  • 8CHANDRASEKARANS,COOPER O,DESHPANDE A,et al.Tele-graphCQ:continuous dataflow processing for an uncertain world[].Proc of Conference on Innovative Data Systems Research.2003
  • 9GONZALEZ H,HAN Jia-wei,LI Xiao-lei.Flowcube:constructingRFID flowcubes for multi-dimensional analysis of commodity flows[].Proc of VLDB.2006
  • 10GONZALEZ H,HAN Jia-wei,LI Xiao-lei,et al.Warehousing andanalyzing massive RFID data sets[].Proc of ICDE.2006

共引文献70

同被引文献15

引证文献4

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部