Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3410530.3414422acmconferencesArticle/Chapter ViewAbstractPublication PagesubicompConference Proceedingsconference-collections
poster

Anomaly detection for mobile devices in industrial internet

Published: 12 September 2020 Publication History

Abstract

The concept of "Industrial Internet" was first proposed by General Electric in 2012. It aims to promote the intellectualization of the whole service system. However, with the development of the Industrial Internet, some criminals launch attacks on industrial control terminals (such as computers and mobile devices), causing the failure of industrial control terminals or wrong instructions, which resulting in factory losses. Therefore, there is an immediate need to extract valuable information from mobile network streaming, accurately detect abnormal behaviors and timely raise the alarm.
In this paper, we propose a method of anomaly detection for mobile devices in Industrial Internet based on knowledge graph and demonstrate the results by using visualization technology. First, we use the optimized data mining algorithm based on frequent item sets to analyse the data, so that our method can accurately detect different kinds of concurrent attacks. Second, this method is able to locate the IP addresses of the attacker and the victim accurately. Third, we design an anomaly alarm module, which can visualize the results in multiple dimensions and assist security administrators to understand complex network situation in real time and take corresponding measures according to the network anomaly.

References

[1]
The caida ucsd backscatter-2008 dataset (2008), http://www.caida.org/data/passive/backscatter_2008_dataset.xml[DB/OL]
[2]
Alfred Inselberg, B.D.: Parallel coordinates. Springer PAGES = 199--233, YEAR = 1991
[3]
E.Shi, W.Zheng: Real-time attacks blind detection and analysis algorithm of mobile internet network. Application of Electronic Technique (2018)
[4]
G.Ma, Z.Wang, J., W.Zhu: Wireless caching in large-scale edge access points: A local distributed approach. In: MobiCom. pp. 726--728. ACM (2018)
[5]
J.Li, et al: Industrial internet: A survey on the enabling technologies, applications, and challenges. IEEE Communications Surveys & Tutorials (2018)
[6]
N.Ding, Y.Liu, Y.Fan, D.Jie: Network attack detection method based on convolutional neural network. Proceedings of 2019 Chinese Intelligent Systems Conference pp. 610--620 (2020)
[7]
O.H.Abdelrahman, E.Gelenbe, G., B.Oklander: Mobile network anomaly detection and mitigation: The nemesys approach. In: International Symposium on Computer and Information Sciences. pp. 429--438 (2013)
[8]
S.Parwez, D., M.Garuba: Big data analytics for user-activity analysis and user-anomaly detection in mobile wireless network. IEEE Transactions on Industrial Informatics 13(4), 2058--2065 (2017)
[9]
Y.Beyene, R.Jantti, K., S.Iraji: On the performance of narrow-band internet of things (nb-iot). In: Wireless Communications and Networking Conference. pp. 1--6 (2017)
[10]
Y.Zhang, H.Li, H.Li: Research on detection of abnormal communication channel in mobile wireless sensor networks. Computer Simulation (2017)

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
UbiComp/ISWC '20 Adjunct: Adjunct Proceedings of the 2020 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2020 ACM International Symposium on Wearable Computers
September 2020
732 pages
ISBN:9781450380768
DOI:10.1145/3410530
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 12 September 2020

Check for updates

Author Tags

  1. anomaly detection
  2. industrial internet
  3. knowledge graph

Qualifiers

  • Poster

Conference

UbiComp/ISWC '20

Acceptance Rates

Overall Acceptance Rate 764 of 2,912 submissions, 26%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 188
    Total Downloads
  • Downloads (Last 12 months)18
  • Downloads (Last 6 weeks)3
Reflects downloads up to 13 Nov 2024

Other Metrics

Citations

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media