Network attack prediction method based on threat intelligence for IoT

被引:0
|
作者
Hongbin Zhang
Yuzi Yi
Junshe Wang
Ning Cao
Qiang Duan
机构
[1] Hebei University of Science and Technology,School of Information Science and Engineering
[2] Hebei Normal University,Hebei Key Laboratory of Network and Information Security
[3] Qingdao Binhai University,College of Information Engineering
[4] Pennsylvania State University,Department of Information Science & Technology
来源
关键词
Social internet of things; Internet of things; Support vector machine; Threat intelligence; Social networks; Malicious behavior;
D O I
暂无
中图分类号
学科分类号
摘要
The Social Internet of Things (SIoT) is a combination of the Internet of Things (IoT) and social networks, which enables better service discovery and improves the user experience. The threat posed by the malicious behavior of social network accounts also affects the SIoT, this paper studies the analysis and prediction of malicious behavior for SIoT accounts, proposed a method for predicting malicious behavior of SIoT accounts based on threat intelligence. The method uses support vector machine (SVM) to obtain threat intelligence related to malicious behavior of target accounts, analyze contextual data in threat intelligence to predict the behavior of malicious accounts. By collecting and analyzing the data in a SIoT environment, verifies the malicious behavior prediction method of SIoT account proposed in this paper.
引用
收藏
页码:30257 / 30270
页数:13
相关论文
共 50 条
  • [41] Risk Assessment Method of IoT Host Based on Attack Graph
    Yang, Hongyu
    Yuan, Haihang
    Zhang, Liang
    MOBILE NETWORKS & APPLICATIONS, 2023, 29 (5): : 1504 - 1513
  • [42] Risk Assessment Method of IoT Host Based on Attack Graph
    Yang, Hongyu
    Yuan, Haihang
    Zhang, Liang
    Mobile Networks and Applications, 2023,
  • [43] Cloud-Based Business Intelligence for a Cellular IoT Network
    Holm, Johann Erich Wolfgang
    Moolman, Leon William
    van der Merwe, Gabriel Petrus Rossouw
    2019 IEEE AFRICON, 2019,
  • [44] Research on Network Attack and Defense Based on Artificial Intelligence Technology
    Li, Mingxuan
    Yang, Zhushi
    Zhong, Jinsong
    He, Ling
    Teng, Yangxin
    PROCEEDINGS OF 2020 IEEE 4TH INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2020), 2020, : 2532 - 2534
  • [45] Threat assessment method based on Bayesian network
    Yang, Jian
    Gao, Wen-Yi
    Liu, Jun
    Jiefangjun Ligong Daxue Xuebao/Journal of PLA University of Science and Technology (Natural Science Edition), 2010, 11 (01): : 43 - 48
  • [46] Data Congestion Prediction in Sensors Based IoT Network
    Yadav, Rajesh K.
    Maheshwari, Aastha
    Nath, Prem
    JOURNAL OF SCIENTIFIC & INDUSTRIAL RESEARCH, 2021, 80 (12): : 1091 - 1095
  • [47] Threat intelligence attribution method based on graph attention mechanism
    Wang, Ting
    Yan, Hanbing
    Lang, Bo
    Beijing Hangkong Hangtian Daxue Xuebao/Journal of Beijing University of Aeronautics and Astronautics, 2024, 50 (07): : 2293 - 2303
  • [48] Threat sorting of air attack targets based on product factor method
    Changchun Institute of Optics, Fine Mechanics and Physics, Chinese Academy of Sciences, Changchun 130033, China
    不详
    Guangdian Gongcheng, 2006, 11 (17-21+141):
  • [49] AN IOT BASED FRAMEWORK FOR PREDICTION OF ENVIORNMENT QUALITY USING ARTIFICIAL INTELLIGENCE
    Alqahtani, Omar Saad
    Kshirsagar, Pravin Ramdas
    2024 IEEE 7TH INTERNATIONAL CONFERENCE ON ADVANCED TECHNOLOGIES, SIGNAL AND IMAGE PROCESSING, ATSIP 2024, 2024, : 613 - 621
  • [50] Design of an IoT DDoS attack prediction system based on data mining technology
    Lingfeng Huang
    The Journal of Supercomputing, 2022, 78 : 4601 - 4623