Security threat model under internet of things using deep learning and edge analysis of cyberspace governance

被引:3
|
作者
Li, Zhi [1 ]
Ge, Yuemeng [2 ]
Guo, Jieying [1 ]
Chen, Mengyao [1 ]
Wang, Junwei [1 ]
机构
[1] NingboTech Univ, Sch Media & Law, Ningbo, Peoples R China
[2] City Univ Macau, Fac Int Tourism & Management, Taipa, Macao, Peoples R China
关键词
Deep learning; Internet of Things; Security threat model; Cyberspace governance; Edge computing; AUTHENTICATION PROTOCOL; NETWORKS; ATTACKS;
D O I
10.1007/s13198-021-01533-w
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Under the background of information age, it is essential to cope with network security problems, ensure the popularization of Internet of Things (IoT) technology based on the Internet, and guarantee the information security, life security, and property security of all countries and individuals. Therefore, the principle and advantages of deep learning (DL) technology is expounded first, and then an IoT security threat model is established combined with edge computing (EC) technology. Additionally, the traditional algorithm is improved to be adapted to the application environment of the current United Nations cyberspace governance actions, and is trained and optimized by data sets. Finally, a modification plan is formulated according to the actual test results. In the experiment, EC is used to establish an excellent IoT security threat model with an efficient and accurate algorithm. The result shows that DL technology and EC technology significantly improve the judgment ability of the IoT security threat model and promote the efficiency of network space governance. This model can inspire the application of emerging computer technology to the IoT network and cyberspace governance, guarantee the construction of global information interconnection, and provide a reference for future research.
引用
收藏
页码:1164 / 1176
页数:13
相关论文
共 50 条
  • [41] Federated Deep Reinforcement Learning for Internet of Things With Decentralized Cooperative Edge Caching
    Wang, Xiaofei
    Wang, Chenyang
    Li, Xiuhua
    Leung, Victor C. M.
    Taleb, Tarik
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (10) : 9441 - 9455
  • [42] Energy-saving service management technology of internet of things using edge computing and deep learning
    Li, Defeng
    Lan, Mingming
    Hu, Yuan
    COMPLEX & INTELLIGENT SYSTEMS, 2022, 8 (05) : 3867 - 3879
  • [43] Intrusion Detection Model of Internet of Things Based on Deep Learning
    Wang, Yan
    Han, Dezhi
    Cui, Mingming
    COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2023, 20 (04) : 1519 - 1540
  • [44] A Multiagent Deep Reinforcement Learning Autonomous Security Management Approach for Internet of Things
    Ren, Bin
    Tang, Yunlong
    Wang, Huan
    Wang, Yichuan
    Liu, Jianxiong
    Gao, Ge
    Wei, Wei
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (15): : 25600 - 25612
  • [45] Hybrid deep learning model for attack detection in internet of things
    H. Rekha
    M. Siddappa
    Service Oriented Computing and Applications, 2022, 16 : 293 - 312
  • [46] Development of lightweight intrusion model in Industrial Internet of Things using deep learning technique
    Sinha, Raj
    Thakur, Padmanabh
    Gupta, Sandeep
    Shukla, Anand
    DISCOVER APPLIED SCIENCES, 2024, 6 (07)
  • [47] Hybrid deep learning model for attack detection in internet of things
    Rekha, H.
    Siddappa, M.
    SERVICE ORIENTED COMPUTING AND APPLICATIONS, 2022, 16 (04) : 293 - 312
  • [48] Minority Resampling Boosted Unsupervised Learning With Hyperdimensional Computing for Threat Detection at the Edge of Internet of Things
    Christopher, Vivek
    Aathman, Tharmasanthiran
    Mahendrakumaran, Kayathiri
    Nawaratne, Rashmika
    De Silva, Daswin
    Nanayakkara, Vishaka
    Alahakoon, Damminda
    IEEE ACCESS, 2021, 9 : 126646 - 126657
  • [49] Security defense strategy algorithm for Internet of Things based on deep reinforcement learning
    Feng, Xuecai
    Han, Jikai
    Zhang, Rui
    Xu, Shuo
    Xia, Hui
    HIGH-CONFIDENCE COMPUTING, 2024, 4 (01):
  • [50] Attack detection in medical Internet of things using optimized deep learning: enhanced security in healthcare sector
    Santhi, J. Aruna
    Saradhi, G. Vijaya
    DATA TECHNOLOGIES AND APPLICATIONS, 2021, 55 (05) : 682 - 714