Internet of things intrusion detection method based on combination of decision tree and self-similar model

An intrusion detection and decision tree technology, applied in the field of Internet of Things security, can solve the problems of failure to detect intrusion behavior, comparison, etc.

Active Publication Date: 2021-05-28
SOUTH CHINA NORMAL UNIVERSITY
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Existing intrusion detection methods basically analyze and detect network information in the current state, without comparing the current state of the network with the historical state of the same period, resulting in failure to detect some hidden intrusion behaviors

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet of things intrusion detection method based on combination of decision tree and self-similar model
  • Internet of things intrusion detection method based on combination of decision tree and self-similar model
  • Internet of things intrusion detection method based on combination of decision tree and self-similar model

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0040] like figure 1 As shown, this embodiment designs an IoT intrusion detection method based on decision tree and self-similarity theory. According to the steps of this embodiment, a slight modification can also be used for intrusion detection in other network environments.

[0041] 1. Select a suitable dataset. Provides a data source for the decision tree algorithm to generate decision trees and self-similar models.

[0042] On the one hand, since the use of the decision tree algorithm to generate a decision tree is a process of machine learning, corresponding training sets and test sets need to be used. On the other hand, the self-similarity of self-similar theory means that the characteristics of a certain structure or process are similar from different spatial or temporal scales, or that the local properties or local structure of a system or structure are similar to the overall Similar. In addition, there is also self-similarity between the whole and the whole or betwe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for intrusion detection of the Internet of Things based on the combination of a decision tree and a self-similar model, including: S1, selecting a suitable data set; S2, generating a decision tree, first creating a tree, and the root node contains all samples Attribute information, adopt the minimum loss function strategy, and gradually deepen the decision tree; use the same method to generate K such decision trees; S3, use the decision tree generated in step S2 to analyze and process the test set prepared in step S1, so that Judging the intrusion status of the current state of the Internet of Things; S4. Establishing the histogram of the current state and the historical state of the Internet of Things data in the same period, using the self-similarity theory to set a suitable mathematical model, and judging whether there is an abnormal phenomenon in the current Internet of Things data. The invention mainly combines a decision tree algorithm and a self-similar model, avoids using a single detection method and fails to detect hidden intrusion behaviors, and makes the intrusion detection of the Internet of Things more comprehensive and accurate.

Description

technical field [0001] The invention relates to the technical field of Internet of Things security, in particular to an Internet of Things intrusion detection method based on the combination of a decision tree and a self-similar model. Background technique [0002] In the information age, we can feel the rapid development of the Internet and information technology in recent years. As an important part of the new generation of information technology, the Internet of Things is called the third wave of the development of the world information industry after computers and the Internet. Because of the advantages of low power consumption, easy deployment, and many node devices, the Internet of Things has led to the continuous expansion of the scale of the Internet of Things industry, and hundreds of millions of devices have been connected to the Internet of Things. The contradiction between the rapidly developing IoT industry and security issues is becoming more and more serious. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06K9/62H04L29/08
CPCH04L63/1416H04L63/1425H04L67/12G06F18/2163
Inventor 龚征程雷王志鹏杨顺志叶开魏运根
Owner SOUTH CHINA NORMAL UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products