Network attack prediction method based on threat intelligence for IoT

被引:0
|
作者
Hongbin Zhang
Yuzi Yi
Junshe Wang
Ning Cao
Qiang Duan
机构
[1] Hebei University of Science and Technology,School of Information Science and Engineering
[2] Hebei Normal University,Hebei Key Laboratory of Network and Information Security
[3] Qingdao Binhai University,College of Information Engineering
[4] Pennsylvania State University,Department of Information Science & Technology
来源
关键词
Social internet of things; Internet of things; Support vector machine; Threat intelligence; Social networks; Malicious behavior;
D O I
暂无
中图分类号
学科分类号
摘要
The Social Internet of Things (SIoT) is a combination of the Internet of Things (IoT) and social networks, which enables better service discovery and improves the user experience. The threat posed by the malicious behavior of social network accounts also affects the SIoT, this paper studies the analysis and prediction of malicious behavior for SIoT accounts, proposed a method for predicting malicious behavior of SIoT accounts based on threat intelligence. The method uses support vector machine (SVM) to obtain threat intelligence related to malicious behavior of target accounts, analyze contextual data in threat intelligence to predict the behavior of malicious accounts. By collecting and analyzing the data in a SIoT environment, verifies the malicious behavior prediction method of SIoT account proposed in this paper.
引用
收藏
页码:30257 / 30270
页数:13
相关论文
共 50 条
  • [1] Network attack prediction method based on threat intelligence for IoT
    Zhang, Hongbin
    Yi, Yuzi
    Wang, Junshe
    Cao, Ning
    Duan, Qiang
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (21) : 30257 - 30270
  • [2] Network Attack Prediction Method Based on Threat Intelligence
    Wang, Junshe
    Yi, Yuzi
    Zhang, Hongbin
    Cao, Ning
    CLOUD COMPUTING AND SECURITY, PT III, 2018, 11065 : 151 - 160
  • [3] Network Security Threat Intelligence Prediction in Network Traffic Analysis Based on Machine Learning
    Guan Y.
    Applied Mathematics and Nonlinear Sciences, 2024, 9 (01)
  • [4] Framework of Cyber Attack Attribution Based on Threat Intelligence
    Li Qiang
    Yang Zeming
    Liu Baoxu
    Jiang Zhengwei
    Yan Jian
    INTEROPERABILITY, SAFETY AND SECURITY IN IOT, 2017, 190 : 92 - 103
  • [5] ATLAS: A Practical Attack Detection and Live Malware Analysis System for IoT Threat Intelligence
    Aung, Yan Lin
    Ochoa, Martin
    Zhou, Jianying
    INFORMATION SECURITY, ISC 2022, 2022, 13640 : 319 - 338
  • [6] A Threat Prediction Framework for Network Security Based on Attack Patterns and Colored Petri Nets
    Chien, Sheng-Hui
    Ho, Cheng-Seen
    2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL IV, 2010, : 492 - 496
  • [7] Attack scenario graphs for computer network threat analysis and prediction
    Hughes, T
    Sheyner, O
    COMPLEXITY, 2003, 9 (02) : 15 - 18
  • [8] A Network Security Prediction Method Based on Attack Defense Tree
    Li, Junyi
    Wu, Yongdong
    Li, Yang
    Zhang, Ziwen
    Fouad, Hassan
    Altameem, Torki
    JOURNAL OF NANOELECTRONICS AND OPTOELECTRONICS, 2023, 18 (03) : 357 - 366
  • [9] Quantitative Method for Network Security Situation Based on Attack Prediction
    Hu, Hao
    Zhang, Hongqi
    Liu, Yuling
    Wang, Yongwei
    SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [10] Attack Hypotheses Generation Based on Threat Intelligence Knowledge Graph
    Kaiser, Florian Klaus
    Dardik, Uriel
    Elitzur, Aviad
    Zilberman, Polina
    Daniel, Nir
    Wiens, Marcus
    Schultmann, Frank
    Elovici, Yuval
    Puzis, Rami
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (06) : 4793 - 4809