Affiliation:
1. School of Automation, Key Laboratory of Modern Measurement and Control Technology Ministry of Education, Beijing Information Science & Technology University, Beijing 100192, China
2. School of Automation, Beijing Information Science & Technology University, Beijing 100192, China
Abstract
The Industrial Internet of Things (IIoT) is used in various industries to achieve industrial automation and intelligence. Therefore, it is important to assess the network security situation of the IIoT. The existing network situation assessment methods do not take into account the particularity of the IIoT’s network security requirements and cannot achieve accurate assessment. In addition, IIoT transmits a lot of heterogeneous data, which is subject to cyber attacks, and existing classification methods cannot effectively deal with unbalanced data. To solve the above problems, this paper first considers the special network security requirements of the IIoT, and proposes a quantitative evaluation method of network security based on the Analytic Hierarchy Process (AHP). Then, the average under-/oversampling (AUOS) method is proposed to solve the problem of unbalance of network attack data. Finally, an IIoT network security situation assessment classifier based on the eXtreme Gradient Boosting (XGBoost) is constructed. Experiments show that the situation assessment method proposed in this paper can more accurately characterize the network security state of the IIoT. The AUOS method can achieve data balance without generating too much data, and does not burden the training of the model. The classifier constructed in this paper is superior to the traditional classification algorithm.
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Hardware and Architecture,Signal Processing,Control and Systems Engineering
Reference43 articles.
1. A Survey on Access Control in the Age of Internet of Things;Qiu;IEEE Internet Things J.,2020
2. Attacks on the Industrial Internet of Things—Development of a multi-layer Taxonomy;Berger;Comput. Secur.,2020
3. Design and Evaluation for Situation Awareness Enhancement;Endsley;Proceedings of the Human Factors and Ergonomics Society Annual Meeting,1988
4. A glimpse into the future of ID;Bass;Mag. Usenix Sage,1999
5. Tadda, G.P., and Salerno, J.S. (2009). Advances in Information Security, Springer.
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献