{"title":"工业互联网中移动设备的异常检测","authors":"Ge Ma, Weixi Gu, Qiyang Huang, Guowei Zhu, Kan Lv, Yujia Li","doi":"10.1145/3410530.3414422","DOIUrl":null,"url":null,"abstract":"The concept of \"Industrial Internet\" was first proposed by General Electric in 2012. It aims to promote the intellectualization of the whole service system. However, with the development of the Industrial Internet, some criminals launch attacks on industrial control terminals (such as computers and mobile devices), causing the failure of industrial control terminals or wrong instructions, which resulting in factory losses. Therefore, there is an immediate need to extract valuable information from mobile network streaming, accurately detect abnormal behaviors and timely raise the alarm. In this paper, we propose a method of anomaly detection for mobile devices in Industrial Internet based on knowledge graph and demonstrate the results by using visualization technology. First, we use the optimized data mining algorithm based on frequent item sets to analyse the data, so that our method can accurately detect different kinds of concurrent attacks. Second, this method is able to locate the IP addresses of the attacker and the victim accurately. Third, we design an anomaly alarm module, which can visualize the results in multiple dimensions and assist security administrators to understand complex network situation in real time and take corresponding measures according to the network anomaly.","PeriodicalId":7183,"journal":{"name":"Adjunct Proceedings of the 2020 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2020 ACM International Symposium on Wearable Computers","volume":"35 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2020-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Anomaly detection for mobile devices in industrial internet\",\"authors\":\"Ge Ma, Weixi Gu, Qiyang Huang, Guowei Zhu, Kan Lv, Yujia Li\",\"doi\":\"10.1145/3410530.3414422\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The concept of \\\"Industrial Internet\\\" was first proposed by General Electric in 2012. It aims to promote the intellectualization of the whole service system. However, with the development of the Industrial Internet, some criminals launch attacks on industrial control terminals (such as computers and mobile devices), causing the failure of industrial control terminals or wrong instructions, which resulting in factory losses. Therefore, there is an immediate need to extract valuable information from mobile network streaming, accurately detect abnormal behaviors and timely raise the alarm. In this paper, we propose a method of anomaly detection for mobile devices in Industrial Internet based on knowledge graph and demonstrate the results by using visualization technology. First, we use the optimized data mining algorithm based on frequent item sets to analyse the data, so that our method can accurately detect different kinds of concurrent attacks. Second, this method is able to locate the IP addresses of the attacker and the victim accurately. Third, we design an anomaly alarm module, which can visualize the results in multiple dimensions and assist security administrators to understand complex network situation in real time and take corresponding measures according to the network anomaly.\",\"PeriodicalId\":7183,\"journal\":{\"name\":\"Adjunct Proceedings of the 2020 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2020 ACM International Symposium on Wearable Computers\",\"volume\":\"35 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-09-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Adjunct Proceedings of the 2020 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2020 ACM International Symposium on Wearable Computers\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3410530.3414422\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Adjunct Proceedings of the 2020 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2020 ACM International Symposium on Wearable Computers","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3410530.3414422","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

“工业互联网”的概念最早由通用电气公司在2012年提出。旨在促进整个服务系统的智能化。然而,随着工业互联网的发展,一些不法分子对工业控制终端(如计算机和移动设备)发动攻击,造成工业控制终端故障或指令错误,给工厂造成损失。因此,迫切需要从移动网络流中提取有价值的信息,准确发现异常行为并及时报警。本文提出了一种基于知识图谱的工业互联网移动设备异常检测方法,并利用可视化技术对检测结果进行了展示。首先,我们使用优化后的基于频繁项集的数据挖掘算法对数据进行分析,使我们的方法能够准确检测出不同类型的并发攻击。其次,该方法能够准确定位攻击者和受害者的IP地址。第三,我们设计了异常报警模块,可以将结果多维可视化,帮助安全管理员实时了解复杂的网络情况,并根据网络异常采取相应的措施。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Anomaly detection for mobile devices in industrial internet
The concept of "Industrial Internet" was first proposed by General Electric in 2012. It aims to promote the intellectualization of the whole service system. However, with the development of the Industrial Internet, some criminals launch attacks on industrial control terminals (such as computers and mobile devices), causing the failure of industrial control terminals or wrong instructions, which resulting in factory losses. Therefore, there is an immediate need to extract valuable information from mobile network streaming, accurately detect abnormal behaviors and timely raise the alarm. In this paper, we propose a method of anomaly detection for mobile devices in Industrial Internet based on knowledge graph and demonstrate the results by using visualization technology. First, we use the optimized data mining algorithm based on frequent item sets to analyse the data, so that our method can accurately detect different kinds of concurrent attacks. Second, this method is able to locate the IP addresses of the attacker and the victim accurately. Third, we design an anomaly alarm module, which can visualize the results in multiple dimensions and assist security administrators to understand complex network situation in real time and take corresponding measures according to the network anomaly.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Using gamification to create and label photos that are challenging for computer vision and people Pose evaluation for dance learning application using joint position and angular similarity SParking: a win-win data-driven contract parking sharing system HeadgearX Blink rate variability: a marker of sustained attention during a visual task
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1