RETRACTED ARTICLE: Mobile network intrusion detection for IoT system based on transfer learning algorithm
- PDF / 1,850,030 Bytes
- 16 Pages / 595.276 x 790.866 pts Page_size
- 92 Downloads / 222 Views
Mobile network intrusion detection for IoT system based on transfer learning algorithm Lianbing Deng1,2 · Daming Li3,4,5 · Xiang Yao2 · David Cox6 · Haoxiang Wang7,8 Received: 10 October 2017 / Revised: 10 January 2018 / Accepted: 12 January 2018 © Springer Science+Business Media, LLC, part of Springer Nature 2018
Abstract The open deployment environment and limited resources of the Internet of things (IoT) make it vulnerable to malicious attacks, while the traditional intrusion detection system is difficult to meet the heterogeneous and distributed features of the Internet of things. The security and privacy protection of IoT is directly related to the practical application of IoT. In this paper, We analyze the characteristics of networking security and security problems, and discuss the system framework of Internet security and some key security technologies, including key management, authentication and access control, routing security, privacy protection, intrusion detection and fault tolerance and intrusion etc. This paper introduces the current problems of IoT in network security, and points out the necessity of intrusion detection. Several kinds of intrusion detection technologies are discussed, and its application on IoT architecture is analyzed. We compare the application of different intrusion detection technologies, and make a prospect of the next phase of research. Using data mining and machine learning methods to study network intrusion technology has become a hot issue. A single class feature or a detection model is very difficult to improve the detection rate of network intrusion detection. The performance of the proposed model is validated through the public databases. Keywords Intrusion detection · Internet of things · Information security · Pop learning
1 Introduction With the development of wireless sensor network (WSN), communication technology and Internet of things (IoT) technology, more application environments use sensors and
B
Daming Li [email protected]
1
Huazhong University of Science and Technology, Wuhan, China
2
Zhuhai Da Hengqin Science and Technology Development Co., Ltd., Hengqin, China
3
The Post-Doctoral Research Center of Zhuhai Da Hengqin Science and Technology Development Co., Ltd., Hengqin, China
4
City University of Macau, Taipa, Macau
5
International Postdoctoral Science and Technology Research Institute Co., Ltd, Wuhan, China
6
Harvard John A. Paulson School of Engineering & Applied Sciences, Harvard University, Cambridge, MA, USA
7
Cornell University, Ithaca, NY, USA
8
GoPerception Laboratory, New York, NY, USA
wireless communication devices, which consist of a largescale IoT communication system. The application of the IoT will involve military, people’s livelihood, industry and Commerce and other fields, and the importance of its network security is self-evident. Once the problem of information security appears, such as virus damage, hacker intrusion, malicious code attacks and other issues, the damage and losses will be very serious. The IoT is base
Data Loading...