Edge computing terminal security level evaluation method for random forest

An edge computing and random forest technology, applied in the field of level evaluation, can solve problems such as data security threats

Active Publication Date: 2019-08-16
UNIV OF ELECTRONICS SCI & TECH OF CHINA +1
View PDF7 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the face of a large number of heterogeneous terminals accessing the Internet of Things, the edge computing side is also facing greater data security threats and hidden dangers, and there are some untrusted terminals and illegal access problems of mobile edge application developers.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Edge computing terminal security level evaluation method for random forest
  • Edge computing terminal security level evaluation method for random forest
  • Edge computing terminal security level evaluation method for random forest

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] The technical solution of the present invention will be further described in detail below in conjunction with the accompanying drawings, but the protection scope of the present invention is not limited to the following description.

[0056] Such as figure 1 As shown, a random forest edge computing side terminal security level assessment method includes the following steps:

[0057] S1. Build a security test platform on the edge computing side, set k test items of the terminal, and the test result of each test item is 0 or 1, where 0 means fail and 1 means pass;

[0058] S2. On the security test platform at the edge side, test m+n smart terminals according to k individual test items, and obtain the single-item test result set of security performance of each smart terminal, among which the single item of security performance of the i-th smart terminal The test result set is:

[0059] x i =[x i1 ,x i2 ,...,x ik ], i=1,2,...,m+n;

[0060] where x ij It is the j-th t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an edge computing terminal security level evaluation method for a random forest. The terminal security level evaluation method comprises the following steps: S1, setting security test items of a terminal and test results of the security test items; S2, testing the accessed intelligent terminal; S3, determining a corresponding relationship between the security level of the intelligent terminal and the single test result set; S4, calculating a security level corresponding to each edge terminal to obtain a data set; S5, dividing the data set into a training set and a testset; s6, inputting the training set into a random forest for training to obtain a mature classifier model; s7, inputting the test set into a random forest classifier model obtained through training, and comparing an obtained test result with the security level in the step S4 to obtain a standard classifier; and S8, evaluating the security level of the newly accessed terminal by using the standardclassifier model. According to the method, the data security requirements of the edge terminal are divided according to the grades, and edge computing side terminal security assessment can be carriedout through a quantized objective standard according to confronted security risks and system complexity.

Description

technical field [0001] The present invention relates to an edge computing terminal security level evaluation method, in particular to a random forest edge computing terminal security level evaluation method. Background technique [0002] With the rapid development and wide application of the Internet of Everything, smart terminals will become key nodes of the Internet of Everything and generate massive amounts of real-time data. According to IDC statistics, by 2020 there will be more than 50 billion terminals and devices connected to the network, and more than 50% of the data will need to be analyzed, processed and stored at the edge of the network. Massive data generated by a large number of edge devices requires more agile connections, more efficient data processing, and better data protection. In the face of a large number of heterogeneous terminals accessing the Internet of Things, the edge computing side is also facing greater data security threats and hidden dangers, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57G06K9/62
CPCG06F21/577G06F18/24323G06F18/214
Inventor 雷文鑫文红侯文静刘文洁
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products