Algoritmo de inteligencia adaptable a un Framework de Ciberseguridad para IIoT

IF 0.5 Q4 ENGINEERING, MULTIDISCIPLINARY Ingenieria y Competitividad Pub Date : 2022-05-26 DOI:10.25100/iyc.v0i00.11762
Katerine Márceles Villalba, Santiago Ordoñez Tumbo, Siler Amador Donado
{"title":"Algoritmo de inteligencia adaptable a un Framework de Ciberseguridad para IIoT","authors":"Katerine Márceles Villalba, Santiago Ordoñez Tumbo, Siler Amador Donado","doi":"10.25100/iyc.v0i00.11762","DOIUrl":null,"url":null,"abstract":"The industrial internet of things (IIoT) has grown in recent years, which makes it possible to publicize new technological innovations and be able to integrate them with each other, such as smart cities among other applications such as: health, education, traffic among others , but at the same time there is a problem that is security, since lately there have been several security incidents related to IIoT, more specifically to the networks that handle these technologies such as: ISPs (Internet Service Provider), which makes it necessary to adopt and investigate the inclusion of artificial intelligence in cybersecurity, which this provides new paradigms that will help in a satisfactory solution (1)The Objective was propose an intelligence technique adaptable to a cybersecurity framework with the ability to solve network security problems in IIoT devices. For the development of this work, the action research methodology (IA) is used, which consists of uniting theory with practice in such a way that the researcher can draw correct conclusions about the practices carried out. Because this type of methodology seeks to solve specific problems in a specific community, continuously managing to understand and interpret to improve from them (2). It has been found that there are a great variety of intelligence techniques such as Deep Learning deep learning, which obtained a very high score in the characterization due to its great possibilities when integrating the algorithm into the field of cybersecurity. very little characterized; However, in the initial research that was carried out, the result was how to work with this technology and how to adapt it to cybersecurity. There are different ways to analyze and secure data on the network, one of those are learning techniques, in this research several techniques were identified that with their respective algorithms that provided the basis for adaptability with a framework related to IIoT technologies.","PeriodicalId":43348,"journal":{"name":"Ingenieria y Competitividad","volume":null,"pages":null},"PeriodicalIF":0.5000,"publicationDate":"2022-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Ingenieria y Competitividad","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.25100/iyc.v0i00.11762","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"ENGINEERING, MULTIDISCIPLINARY","Score":null,"Total":0}
引用次数: 0

Abstract

The industrial internet of things (IIoT) has grown in recent years, which makes it possible to publicize new technological innovations and be able to integrate them with each other, such as smart cities among other applications such as: health, education, traffic among others , but at the same time there is a problem that is security, since lately there have been several security incidents related to IIoT, more specifically to the networks that handle these technologies such as: ISPs (Internet Service Provider), which makes it necessary to adopt and investigate the inclusion of artificial intelligence in cybersecurity, which this provides new paradigms that will help in a satisfactory solution (1)The Objective was propose an intelligence technique adaptable to a cybersecurity framework with the ability to solve network security problems in IIoT devices. For the development of this work, the action research methodology (IA) is used, which consists of uniting theory with practice in such a way that the researcher can draw correct conclusions about the practices carried out. Because this type of methodology seeks to solve specific problems in a specific community, continuously managing to understand and interpret to improve from them (2). It has been found that there are a great variety of intelligence techniques such as Deep Learning deep learning, which obtained a very high score in the characterization due to its great possibilities when integrating the algorithm into the field of cybersecurity. very little characterized; However, in the initial research that was carried out, the result was how to work with this technology and how to adapt it to cybersecurity. There are different ways to analyze and secure data on the network, one of those are learning techniques, in this research several techniques were identified that with their respective algorithms that provided the basis for adaptability with a framework related to IIoT technologies.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
适用于工业物联网网络安全框架的智能算法
工业物联网(IIoT)近年来不断发展,这使得有可能宣传新的技术创新,并能够将它们相互集成,例如智能城市等其他应用,如:健康,教育,交通等,但同时存在一个安全问题,因为最近有几个与IIoT相关的安全事件,更具体地说,是处理这些技术的网络,如:isp(互联网服务提供商),这使得有必要采用和研究将人工智能纳入网络安全,这提供了新的范例,将有助于实现令人满意的解决方案(1)目标是提出一种适用于网络安全框架的智能技术,能够解决工业物联网设备中的网络安全问题。为了开展这项工作,使用了行动研究方法(IA),该方法将理论与实践结合起来,使研究人员能够对所进行的实践得出正确的结论。因为这种类型的方法寻求解决特定社区中的特定问题,不断设法理解和解释并从中改进(2)。人们发现,有各种各样的智能技术,如深度学习深度学习,在将算法整合到网络安全领域时,由于其巨大的可能性,在表征中获得了很高的分数。很少有特征的;然而,在进行的初步研究中,结果是如何使用这项技术以及如何使其适应网络安全。有不同的方法来分析和保护网络上的数据,其中之一是学习技术,在本研究中确定了几种技术,它们具有各自的算法,为与工业物联网技术相关的框架的适应性提供了基础。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Ingenieria y Competitividad
Ingenieria y Competitividad ENGINEERING, MULTIDISCIPLINARY-
自引率
20.00%
发文量
38
期刊最新文献
Análisis de biochar y metales: una revisión sistemática y análisis bibliométrico Algoritmos de inteligencia artificial basada en perfiles socio conductuales para la segmentación inteligente de clientes: estudio de caso Influencia del catalizador en las propiedades fisicoquímicas de metil ésteres obtenidos a partir de aceite de Chrysobalanus icaco Andamios porosos para ingeniería de tejidos óseos: características geométricas, requerimientos de uso, y materiales y métodos de manufactura aditiva Caracterización de líquidos en la región de microondas usando sensor de permitividad dieléctrica
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1