Ge Ma, Weixi Gu, Qiyang Huang, Guowei Zhu, Kan Lv, Yujia Li
{"title":"工业互联网中移动设备的异常检测","authors":"Ge Ma, Weixi Gu, Qiyang Huang, Guowei Zhu, Kan Lv, Yujia Li","doi":"10.1145/3410530.3414422","DOIUrl":null,"url":null,"abstract":"The concept of \"Industrial Internet\" was first proposed by General Electric in 2012. It aims to promote the intellectualization of the whole service system. However, with the development of the Industrial Internet, some criminals launch attacks on industrial control terminals (such as computers and mobile devices), causing the failure of industrial control terminals or wrong instructions, which resulting in factory losses. Therefore, there is an immediate need to extract valuable information from mobile network streaming, accurately detect abnormal behaviors and timely raise the alarm. In this paper, we propose a method of anomaly detection for mobile devices in Industrial Internet based on knowledge graph and demonstrate the results by using visualization technology. First, we use the optimized data mining algorithm based on frequent item sets to analyse the data, so that our method can accurately detect different kinds of concurrent attacks. Second, this method is able to locate the IP addresses of the attacker and the victim accurately. Third, we design an anomaly alarm module, which can visualize the results in multiple dimensions and assist security administrators to understand complex network situation in real time and take corresponding measures according to the network anomaly.","PeriodicalId":7183,"journal":{"name":"Adjunct Proceedings of the 2020 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2020 ACM International Symposium on Wearable Computers","volume":"35 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2020-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Anomaly detection for mobile devices in industrial internet\",\"authors\":\"Ge Ma, Weixi Gu, Qiyang Huang, Guowei Zhu, Kan Lv, Yujia Li\",\"doi\":\"10.1145/3410530.3414422\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The concept of \\\"Industrial Internet\\\" was first proposed by General Electric in 2012. It aims to promote the intellectualization of the whole service system. However, with the development of the Industrial Internet, some criminals launch attacks on industrial control terminals (such as computers and mobile devices), causing the failure of industrial control terminals or wrong instructions, which resulting in factory losses. Therefore, there is an immediate need to extract valuable information from mobile network streaming, accurately detect abnormal behaviors and timely raise the alarm. In this paper, we propose a method of anomaly detection for mobile devices in Industrial Internet based on knowledge graph and demonstrate the results by using visualization technology. First, we use the optimized data mining algorithm based on frequent item sets to analyse the data, so that our method can accurately detect different kinds of concurrent attacks. Second, this method is able to locate the IP addresses of the attacker and the victim accurately. Third, we design an anomaly alarm module, which can visualize the results in multiple dimensions and assist security administrators to understand complex network situation in real time and take corresponding measures according to the network anomaly.\",\"PeriodicalId\":7183,\"journal\":{\"name\":\"Adjunct Proceedings of the 2020 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2020 ACM International Symposium on Wearable Computers\",\"volume\":\"35 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-09-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Adjunct Proceedings of the 2020 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2020 ACM International Symposium on Wearable Computers\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3410530.3414422\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Adjunct Proceedings of the 2020 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2020 ACM International Symposium on Wearable Computers","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3410530.3414422","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Anomaly detection for mobile devices in industrial internet
The concept of "Industrial Internet" was first proposed by General Electric in 2012. It aims to promote the intellectualization of the whole service system. However, with the development of the Industrial Internet, some criminals launch attacks on industrial control terminals (such as computers and mobile devices), causing the failure of industrial control terminals or wrong instructions, which resulting in factory losses. Therefore, there is an immediate need to extract valuable information from mobile network streaming, accurately detect abnormal behaviors and timely raise the alarm. In this paper, we propose a method of anomaly detection for mobile devices in Industrial Internet based on knowledge graph and demonstrate the results by using visualization technology. First, we use the optimized data mining algorithm based on frequent item sets to analyse the data, so that our method can accurately detect different kinds of concurrent attacks. Second, this method is able to locate the IP addresses of the attacker and the victim accurately. Third, we design an anomaly alarm module, which can visualize the results in multiple dimensions and assist security administrators to understand complex network situation in real time and take corresponding measures according to the network anomaly.