期刊文献+

Malicious Traffic Compression and Classification Technique for Secure Internet of Things 被引量:1

下载PDF
导出
摘要 With the introduction of 5G technology,the application of Internet of Things(IoT)devices is expanding to various industrial fields.However,introducing a robust,lightweight,low-cost,and low-power security solution to the IoT environment is challenging.Therefore,this study proposes two methods using a data compression technique to detect malicious traffic efficiently and accurately for a secure IoT environment.The first method,compressed sensing and learning(CSL),compresses an event log in a bitmap format to quickly detect attacks.Then,the attack log is detected using a machine-learning classification model.The second method,precise re-learning after CSL(Ra-CSL),comprises a two-step training.It uses CSL as the 1st step analyzer,and the 2nd step analyzer is applied using the original dataset for a log that is detected as an attack in the 1st step analyzer.In the experiment,the bitmap rule was set based on the boundary value,which was 99.6%true positive on average for the attack and benign data found by analyzing the training data.Experimental results showed that the CSL was effective in reducing the training and detection time,and Ra-CSL was effective in increasing the detection rate.According to the experimental results,the data compression technique reduced the memory size by up to 20%and the training and detection times by 67%when compared with the conventional technique.In addition,the proposed technique improves the detection accuracy;the Naive Bayes model with the highest performance showed a detection rate of approximately 99%.
出处 《Computers, Materials & Continua》 SCIE EI 2023年第9期3465-3482,共18页 计算机、材料和连续体(英文)
基金 supported by a Korea Institute for Advancement of Technology(KIAT)Grant funded by theKorean Government(MOTIE)(P0008703,The Competency Development Program for Industry Specialists) the MSIT under the ICAN(ICT Challenge and Advanced Network ofHRD)program(No.IITP-2022-RS-2022-00156310)supervised by the Institute of Information Communication Technology Planning and Evaluation(IITP).
  • 相关文献

同被引文献3

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部