The leakage of source code will lead to a serious information security crisis. It is of great significance for electric power mobile micro-applications to detect key codes and then protect them. Aiming at the poor representation ability of JavaScript code, we suggested a key code detection model based on a semantic convolutional memory fusion network. The fusion network was constructed by combining TextCNN and Attention-based BiLSTM to extract code features. The lexical unit sequence that is abstracted from the abstract syntax tree will be input to the fusion network for identification and classification. According to the experimental results, the proposed model shows improvement in the representation ability and overall performance in key code detection.
KEYWORDS: Data modeling, Internet of things, Computer intrusion detection, Education and training, Gallium nitride, Neural networks, Deep learning, Machine learning, Evolutionary algorithms, Data processing
In recent years, the frequency and complexity of IoT network attacks have significantly increased. NIDS, strategically located in IoT network nodes, is an essential tool for monitoring traffic and detecting and mitigating network-based attacks. However, with the significant increase in computer network attacks, many datasets used for training suffer from imbalanced data problems. Therefore, to address the traffic characteristics of IoT networks and the issue of imbalanced data, this paper proposes an intrusion detection method that combines graph neural networks(E-GraphSAGE) and generative adversarial networks. Based on experiments using datasets NF-BoT-IoT, we found that training ML classifiers on datasets balanced with synthetic samples generated by WGAN-gp increased their prediction accuracy to 93.7% .
KEYWORDS: Robots, Network security, Information security, Control systems, Power grids, Clouds, Matrices, Defense and security, Telecommunications, Monte Carlo methods
The information network of the power grid enterprise is the same as the information system of the common Internet, and its application layer has a lot of general IT software. In order to mine all kinds of software vulnerabilities timely and ensure the normal operation of the software system, the most obvious disadvantage of this method is the low efficiency of implementation, which requires manual dynamic testing after the end of software development. It also needs to track the location of vulnerabilities according to the test results. In this paper, the cooperative control of heterogeneous wireless networked robots based on parallel control is proposed, and the configuration of defense resources is studied from the perspective of protection. Firstly, based on the network security robot, the game model of both sides of the power grid attack and defense under coordinated attack is established, and the optimal defense resource allocation strategy is analyzed and solved. Then, for heterogeneous wireless networks, a step-by-step solution is proposed based on parallel control optimization, and the allocation method of defense resources is formulated. Finally, the proposed method is verified on the simulation test system and compared with AUKF and IMM-UKF. The experimental results verify that the proposed method performs well in error control when the execution state changes, and achieves high accuracy, good stability and strong security prediction ability in general. It can ensure the safety of power grid and promote the healthy development of the national power industry.
KEYWORDS: Network security, Internet of things, Computer security, Information security, Education and training, Defense and security, Detection and tracking algorithms, Design and modelling, Semantics, Internet
With the gradual expansion of network scale, network security problems caused by intrusion attacks and Trojan horse viruses follow. Network attacks are highly targeted and diverse. With a large number of Internet of Things devices in the power system connected to the Internet, the interaction of heterogeneous information and the rapid change of network structure drive the dynamic development of the Internet of Things environment. It further expands the attack surface that may be threatened, and constantly generates new weaknesses and threats. In this paper, a rule-based reasoning method for multi-source knowledge in the security of the Internet of Things was proposed. First, a description logic-based language to represent the classes in the model was adopted. Reasoning rules were designed to supplement the semantic representation ability of the description language, which is to realize the reasoning of implicit facts from multi-source heterogeneous knowledge and data in the security field of the Internet of Things. Compared with the entropy method, the model is proved to be effective in predicting the actual network security situation and has certain practical guiding significance for the actual network security management.
KEYWORDS: Data modeling, Data fusion, Machine learning, Education and training, Feature fusion, Data conversion, Data communications, Data analysis, Data acquisition
The rapid development of edge network devices has led to the explosive growth of their data, and the difficulty of dealing with heterogeneous data in edge devices has been further increased. To solve the problem of heterogeneous data fusion without interaction, this paper proposes a data heterogeneous model analysis based on federated learning. Preprocess the multi-source heterogeneous data to obtain the main features of the condensed data. Then, the multi-source heterogeneous data nodes are positioned to avoid multi-fusion results, and Spatio-temporal correlation degree of the multi-source heterogeneous data is calculated to improve the accuracy of fusion. Finally, a multi-source heterogeneous data fusion model is established based on federated learning to ensure the security of data fusion. Compared with the traditional model, the data fusion of the proposed model is more stable, and the error is smaller. The effectiveness of the proposed model is verified by the stability and accuracy of the fusion of the heterogeneous data. The multi-source heterogeneous data fusion model studied in this paper can improve the quality of Internet of Things data and promote the development of edge devices in China.
KEYWORDS: Computer security, Network security, Data transmission, Databases, Reliability, Information security, Data communications, Internet technology, Internet, Head
In recent years, privacy data has been stolen frequently, and the security of privacy data has been concerned by society. In the big data environment, privacy is facing unprecedented challenges, and some traditional privacy protection technologies are facing failure, so how to choose a reasonable privacy protection technology is a challenging task. To solve the problem of a large amount of data theft in the application of traditional methods in the privacy data security protection, this paper proposes research on privacy data security based on multi-party computation. The hash function is used to encrypt the private data, and the data is stored in the block chain in the form of a private data encryption file. Based on the theory of multi-party computation, a secure multi-party technology protocol is designed, and the protocol is used to verify the identity of the participants in the private data transmission to realize the security protection of private data. The experimental results show that the amount of privacy data stolen by the application design method is less than that of the traditional method, which has important application value for the security protection of privacy data.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.