[go: up one dir, main page]

CN112804189A - Cloud and mist cooperation-based intrusion detection method for Internet of vehicles - Google Patents

Cloud and mist cooperation-based intrusion detection method for Internet of vehicles Download PDF

Info

Publication number
CN112804189A
CN112804189A CN202011491452.6A CN202011491452A CN112804189A CN 112804189 A CN112804189 A CN 112804189A CN 202011491452 A CN202011491452 A CN 202011491452A CN 112804189 A CN112804189 A CN 112804189A
Authority
CN
China
Prior art keywords
data
cost
cloud
fog
algorithm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011491452.6A
Other languages
Chinese (zh)
Inventor
赖英旭
曹天浩
刘静
王一鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing University of Technology
Original Assignee
Beijing University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing University of Technology filed Critical Beijing University of Technology
Priority to CN202011491452.6A priority Critical patent/CN112804189A/en
Publication of CN112804189A publication Critical patent/CN112804189A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/24Classification techniques
    • G06F18/241Classification techniques relating to the classification model, e.g. parametric or non-parametric approaches
    • G06F18/2415Classification techniques relating to the classification model, e.g. parametric or non-parametric approaches based on parametric or probabilistic models, e.g. based on likelihood ratio or false acceptance rate versus a false rejection rate
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/24Classification techniques
    • G06F18/243Classification techniques relating to the number of classes
    • G06F18/24323Tree-organised classifiers
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N20/00Machine learning
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/04Architecture, e.g. interconnection topology
    • G06N3/045Combinations of networks
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/04Architecture, e.g. interconnection topology
    • G06N3/047Probabilistic or stochastic networks
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/08Learning methods
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Computer Security & Cryptography (AREA)
  • Artificial Intelligence (AREA)
  • Evolutionary Computation (AREA)
  • General Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Mathematical Physics (AREA)
  • Computational Linguistics (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Molecular Biology (AREA)
  • Biophysics (AREA)
  • Biomedical Technology (AREA)
  • Computer Hardware Design (AREA)
  • Probability & Statistics with Applications (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Evolutionary Biology (AREA)
  • Medical Informatics (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

本发明公开了基于云雾协同的车联网入侵检测方法,主要由三部分组成,包括:步骤1,由于雾节点和云服务器的计算能力不同,设计了云雾协同防御架构,在资源有限的雾节点将流量数据分为正常数据和可疑数据,在具有强大计算资源的云服务器上将可疑数据具体分类,判别攻击类型。步骤2,由于雾节点资源有限并且网络环境复杂多变的问题,采用CART决策树算法,通过对数据进行检测,能够更快速的确定可疑数据和良性数据。步骤3,针对车联网场景中数据不平衡问题,设计了代价敏感CNN模型,对可疑数据进行具体分类,减少少数攻击漏报率。在模拟现实中的车联网数据集上对算法进行评估,该方法能在较低的资源需求下获得较高的性能。

Figure 202011491452

The invention discloses a vehicle networking intrusion detection method based on cloud-mist collaboration, which is mainly composed of three parts, including: Step 1. Due to the different computing capabilities of fog nodes and cloud servers, a cloud-mist collaborative defense architecture is designed. Traffic data is divided into normal data and suspicious data. The suspicious data is specifically classified on the cloud server with powerful computing resources to determine the attack type. Step 2: Due to the limited resources of fog nodes and the complex and changeable network environment, the CART decision tree algorithm is used to detect suspicious data and benign data more quickly. Step 3: Aiming at the data imbalance problem in the Internet of Vehicles scenario, a cost-sensitive CNN model is designed to specifically classify suspicious data and reduce the false negative rate of a few attacks. The algorithm is evaluated on a simulated real-world IoV dataset, which achieves high performance with low resource requirements.

Figure 202011491452

Description

Cloud and mist cooperation-based intrusion detection method for Internet of vehicles
Technical Field
The invention relates to the technical field of Internet of vehicles network security, in particular to an Internet of vehicles intrusion detection method based on cloud and mist cooperation.
Background
The rapid development of intelligent transportation enables vehicles to communicate with adjacent vehicles or network infrastructure, and to acquire traffic conditions in time, thereby improving safety and efficiency, but also raising many safety issues. The development of the internet of vehicles has great potential safety hazard due to the attack of hackers, and an attacker can access the network and tamper confidential data by using a vulnerability, so that more accidents can be caused, and the significance of safe driving is changed. The attack may destroy the system function of the internet of vehicles, or may abuse the internet of vehicles for its own purpose. For example, some hackers may penetrate the vehicle internal network and use the external network to attack the vehicle by stealing the vehicle-mounted device, and then use the attacked abnormal vehicle to interfere with other users in the vehicle networking environment, which may seriously damage the benefit of the user and even threaten the personal safety of the user.
The internet of vehicles is a fast moving network with strong dynamics, so that the real-time performance of information sharing among vehicles is very important. Since the time of encounter between vehicles is short and rapid action is required on the received information, it is important to quickly determine the reliability of the information. Cryptography involves pairwise keys and overhead, involves computational cost, storage and time, and key theft can lead to intrusion into the internet of vehicles, making it more difficult to guard against attacks initiated from inside the vehicle. Therefore, intrusion detection systems must be deployed in the internet of vehicles network to detect attacks.
In addition to these safety-related challenges, the vehicle also needs to process data collected and received from other vehicles. If the collected traffic data is sent to the cloud to perform required calculation, and then the result is communicated to the vehicles, calculation and communication overhead among the vehicles can be limited, and the privacy of the vehicles can be improved. However, since the road information is time sensitive, this solution may be inefficient. In fog computing, where fog nodes are located between end users and the cloud, with roadside units as fog nodes, fog computing may be an alternative to road condition computing. In this case, the road side unit collects traffic data from vehicles within each road side unit area, and the road conditions are extracted by analyzing the collected data by the road side unit. Communication, detection, positioning between vehicles may be indirectly interacted through the fog nodes.
Therefore, in order to solve the information security problem of the internet of vehicles, the cloud and fog cooperation-based intrusion detection method for the internet of vehicles is provided, the particularity of the internet of vehicles compared with the original traditional internet is fully considered, and the characteristics of higher computing capacity, storage capacity and security requirements are mainly adopted, so that an intrusion detection model is constructed by machine learning and deep learning technologies which are broken through in various fields at present.
Disclosure of Invention
The invention aims to provide a method for detecting the intrusion of a vehicle networking network, which is used for solving the problem of high dynamic vehicle networking network safety. The technical scheme for solving the technical problems is as follows, and the cloud and mist cooperation-based intrusion detection method for the Internet of vehicles comprises the following steps:
step 1, converting the vehicle networking data into a feature vector data set, wherein the feature vector set specifically comprises information such as an 802.11p protocol IP address and type, time, a source IP, a destination IP, a protocol name, a packet size, a port number, a flag and the like in a UDP datagram and an IP datagram, and packet loss rate, communication link times and the like. Learning the characteristic vector data set by using a decision tree CART algorithm at the mist node with limited resources to obtain a decision tree CART classifier;
step 2, preliminarily classifying the data by adopting a decision tree CART at the fog node, and sending the preliminary classification result to a cloud server by the fog node;
and 3, deploying a cost sensitive CNN algorithm on the cloud server, and specifically classifying the data sent by the fog nodes.
The key technical points of the invention are as follows: the CART decision tree algorithm is adopted for the first time in the fog node detection of the Internet of vehicles, the algorithm has the characteristics of simple model and simple rule extraction, a binary tree-form simple decision tree is formed by utilizing a binary recursive splitting method, and the method is suitable for the requirements of limited fog node resources and real-time detection; according to the characteristics that the resources of the fog nodes are limited and the resources of the cloud server are unlimited, different computing tasks are distributed at the fog nodes and the cloud server, and the cooperative computing is realized: the data are divided into normal data and suspicious data by the fog node, the suspicious data are sent to the cloud server, and specific attack category detection is carried out on the cloud server; the cloud server side adopts cost sensitive CNN, namely a cost matrix is added between softmax and loss layers of the CNN, and parameters are automatically updated through joint optimization, so that the detection accuracy of the attack is improved.
The invention has the beneficial effects that:
the cloud computing method and the cloud computing system avoid the situation that all collected traffic data are sent to the cloud to execute required computation, reduce end-to-end time delay, detect the flow passing through the cloud nodes by adopting a CART algorithm, and meet the real-time requirement of the Internet of vehicles.
Secondly, the cloud and mist cooperative mode is adopted, so that the mist nodes and the cloud server work cooperatively, the storage and calculation advantages of different devices are better utilized, and the attack behavior in the environment is detected.
By improving the CNN algorithm, the unbalanced data in the actual scene can be better processed, the attack behavior can be accurately detected, and the safety of the data in the cloud server can be protected.
In conclusion, the attack behavior can be detected more quickly by adopting the CART algorithm, and the real-time requirement of the fog node is met. And by adopting a cloud and mist cooperative mode, resources in the mist nodes and the cloud server can be effectively utilized. At the Internet of vehicles server side, the detection accuracy rate of the unbalanced data can be improved based on the cost sensitive CNN method. The invention can detect abnormal behaviors from the network flow of the Internet of vehicles and protect the network security of the Internet of vehicles.
Drawings
Fig. 1 is a schematic view of the general structure of the present invention.
FIG. 2 is a schematic illustration of the cloud and mist cooperative detection of the present invention.
Fig. 3 is a model diagram of the CNN algorithm employed in the present invention.
Detailed Description
The principles and features of this invention are described below in conjunction with the following drawings, which are set forth by way of illustration only and are not intended to limit the scope of the invention.
Example one
In the first embodiment, a CART decision tree algorithm is adopted, the algorithm has the characteristics of simple model and simple rule extraction, a binary tree-form simple decision tree is formed by utilizing a binary recursive splitting method, and the method is suitable for an intrusion detection algorithm on a fog node. The algorithm principle is as follows:
step 1, calculating the GINI coefficient of each attribute in the attributes, and selecting the attribute with the minimum GINI coefficient as the splitting attribute of the root node. For the continuous attribute, calculating a segmentation threshold value, discretizing the continuous attribute according to the segmentation threshold value, and calculating a GINI coefficient of the continuous attribute; for the discrete attribute, the sample set needs to be divided according to the possible subsets of the discrete attribute value, if there are N discrete attributes, then there are 2 effective subsetsn-2, then selecting the subset with the smallest GINI coefficient as the partition of the discrete attribute, the smallest GINI coefficient being the GINI coefficient of the discrete attribute.
Calculation of the GINI coefficient:
(1) assume the entire sample set is S and the class set is { C1,C2,...,CnDividing the data into n classes, each class corresponding to a sample subset Si. Let | S | be the number of samples in the sample set S, | CiI is the class C in the sample set SiThe number of samples of (1), the GINI coefficient of the sample set is defined as follows
Figure BDA0002840861320000051
Wherein p isi=|CiI/S I belongs to class C for sample set sampleiThe probability of (c).
(2) When there is only binary splitting, the subset S into which S is divided for the attribute A in the training sample set S1And S2The GINI coefficient for a given partition S is as follows
Figure BDA0002840861320000052
And the k-th subset occupies the weight of the whole sample set.
If the split attribute is a continuous attribute, dividing the sample set into two parts of T and T according to the value of the attribute, wherein T is a division threshold value of the continuous attribute; if the split attribute is a discrete attribute, the sample set is divided into two parts according to whether the value of the attribute is contained in the true subset of the discrete attribute with the minimum GINI coefficient.
Step 3, two sample subsets S corresponding to the splitting attribute of the root node1And S2And recursively establishing child nodes of the tree by adopting the same method as the step 1. And the process is circulated until the samples in all the child nodes belong to the same category or no attribute which can be selected as the splitting attribute exists.
And 4, pruning the generated decision tree.
Based on the method, the invention adopts detection time and recall (recall) evaluation indexes commonly used in the field of machine learning to evaluate the effectiveness and reliability of the algorithm. The evaluation criteria are defined as follows:
detection time T2 (detection completion time) -T1 (start detection time)
Figure BDA0002840861320000061
Example two
As shown in fig. 1, the second embodiment is a schematic diagram of the general structure of the invention in the environment of internet of vehicles, and the general structure is mainly divided into three parts: cloud server, fog node and terminal equipment. As shown in fig. 2, in order to reasonably utilize resources in the cloud computing and cloud computing system and effectively execute the intrusion detection task, the cloud and mist cooperative detection method of the present invention includes:
and step 21, the fog node classifies the data into normal data and suspicious data according to a second classification. And if the fog node detects normal data, the normal data is processed locally, and the data sent to the cloud server is reduced, so that the user privacy data in the intelligent transportation environment is protected.
And step 22, on the fog node, if the detected data is abnormal data, the fog node sends the abnormal data to the cloud server.
And step 23, performing multi-classification on the abnormal data by adopting a cost sensitive CNN algorithm at the cloud server to obtain a specific attack type.
And 24, the response system in the cloud server sends the result to an administrator at the fog node end, and the administrator can find the infected intelligent equipment and take corresponding measures. Therefore, cooperative work of the fog nodes and the cloud server is achieved.
EXAMPLE III
Embodiment three is an improvement to the CNN algorithm employed on the cloud server. In real life, a large amount of normal traffic and a small amount of abnormal traffic exist in network traffic passing through intelligent traffic fog nodes, so the method and the system attempt to apply cost-sensitive automatic learning to a convolutional neural network of unbalanced data.
Step 1, the invention provides a new cost matrix xi for modifying the last layer of CNN, between softmax and loss layer. The invention introduces a new cost matrix to enable the algorithm model to correctly classify the infrequent classes. Thus, CNN output O is modified using cost matrix ξ according to cross-entropy loss function F as follows:
Figure BDA0002840861320000071
wherein y is(i)Represents the modified output, p represents the desired class,
Figure BDA0002840861320000072
representing a function, in particular a cross-entropy loss function, O(i)Is the output of the CNN, and,
Figure BDA0002840861320000073
indicating that the modified desired class will output a higher value than the other classes.
Step 2, the method solves the class imbalance problem in CNN training, and introduces a cost sensitive error function which can be expressed as average loss on the training set
Figure BDA0002840861320000074
Wherein the predicted output y before the loss layer is influenced by parameters theta and xi, theta is CNN parameter, xi is cost matrix parameter, M is total number of training set, N represents total number of neurons of the output layer, l (d)(i),y(i) θξ) For the cross entropy loss function, d ∈ {0, 1}1×NIs the desired output (Σ)ndn:=1),y(i)The softmax value obtained is shown. When the model does not work well on the training set, the error is larger, and the learning algorithm aims to find the optimal parameters (theta, xi), so that the average loss of the cost is reduced. Thus optimizing the objective of
*,ξ*) Argmin E (θ, ξ) (equation 4)
The penalty function in the equation selects a cross-entropy penalty function that maximizes the closeness of the prediction to the desired output, as follows:
l(d,y)=-∑n(dnlog yn) (formula 5)
dnIs the desired output (Σ)ndn:=1),ynThe softmax value obtained is shown. Wherein y isnClass dependent cost matrix and output o from the softmax functionnCorrelation, the following formula is the position where the cost matrix is added:
Figure BDA0002840861320000081
wherein the softmax output of the nth element is
Figure BDA0002840861320000082
Which is the ratio of the index of the nth element to the sum of the indices of all elements.
Step 3, learning optimal parameters
When the cross entropy loss function is used, the goal is to learn the parameter θ and the class dependent loss function parameter ξ together. For joint optimization, the two types of parameters are solved alternately by keeping one fixed parameter and minimizing the cost of the other parameter. The algorithm is as follows:
Figure BDA0002840861320000083
Figure BDA0002840861320000091
the CNN algorithm is improved by adopting the method, and the improved algorithm is applied to a cloud server of intelligent transportation, so that the classification of intrusion data is realized.
Step 4, the structure of the CNN model is shown in fig. 3. The model consists of two convolutional layers, two pooling layers, a fully-connected layer and a dropout layer, and a softmax classifier.
Based on the method, the invention adopts the detection accuracy (precision) evaluation index commonly used in the field of machine learning to evaluate the effectiveness and reliability of the algorithm. The evaluation criteria are defined as follows:
Figure BDA0002840861320000092
it should be understood that although the description is made in terms of embodiments, not every embodiment includes only a single embodiment, and such description is for clarity only, and those skilled in the art will recognize that the embodiments described herein may be combined as appropriate, and implemented as would be understood by those skilled in the art.

Claims (5)

1.一种基于云雾协同的车联网入侵检测方法,其特征在于:采用云雾协同的数据分类方法,在雾节点采用决策树CART分类器进行粗分类,云服务器采用代价敏感CNN算法进行具体分类,包括:1. A vehicle networking intrusion detection method based on cloud-mist collaboration, is characterized in that: adopt the data classification method of cloud-mist collaboration, adopt decision tree CART classifier to carry out rough classification at fog nodes, and cloud server adopts cost-sensitive CNN algorithm to carry out specific classification, include: 步骤1,将车联网数据转化为特征向量数据集,特征向量集具体包括802.11p协议IP地址及类型,UDP数据报和IP数据报中的时间、源IP、目的IP、协议名、包大小、端口号、flag信息,以及丢包率、通信链接次数。在资源有限的雾节点利用决策树CART算法对特征向量数据集进行学习,获得决策树CART分类器;Step 1: Convert the Internet of Vehicles data into a feature vector data set. The feature vector set specifically includes the 802.11p protocol IP address and type, the time, source IP, destination IP, protocol name, packet size, UDP datagram and IP datagram in the UDP datagram. Port number, flag information, as well as packet loss rate and number of communication links. The decision tree CART algorithm is used to learn the feature vector data set in the fog nodes with limited resources, and the decision tree CART classifier is obtained; 步骤2,在雾节点采用决策树CART将特征向量数据集初步分类,初步分类后的特征向量数据发送至云服务器;In step 2, the decision tree CART is used at the fog node to preliminarily classify the feature vector data set, and the preliminarily classified feature vector data is sent to the cloud server; 步骤3,在云服务器上,部署代价敏感CNN算法,代价敏感CNN算法对雾节点发送的数据进行具体分类。Step 3: On the cloud server, deploy the cost-sensitive CNN algorithm, and the cost-sensitive CNN algorithm specifically classifies the data sent by the fog nodes. 2.根据权利要求1所述的一种基于云雾协同的车联网入侵检测方法,其特征在于,所述步骤2中在雾节点采用决策树CART算法进行初步分类,包括:2. a kind of car networking intrusion detection method based on cloud-fog collaboration according to claim 1, is characterized in that, in described step 2, adopts decision tree CART algorithm to carry out preliminary classification in fog node, comprises: 在车联网的雾节点检测中采用CART决策树算法,CART决策树通过选取GINI系数最小的属性作为根节点的分裂属性,利用二元递归分裂方法形成一种二叉树形式的简单决策树,并且在雾节点进行二分类时效率最高,适合雾节点资源有限并且实时性检测要求。The CART decision tree algorithm is used in the fog node detection of the Internet of Vehicles. The CART decision tree selects the attribute with the smallest GINI coefficient as the split attribute of the root node, and uses the binary recursive splitting method to form a simple decision tree in the form of a binary tree. The node has the highest efficiency for binary classification, which is suitable for the limited resources of fog nodes and real-time detection requirements. 3.根据权利要求1所述的一种基于云雾协同的车联网入侵检测方法,其特征在于,所述步骤2中在雾节点和云服务器进行不同计算任务分配实现协同,具体协同步骤包括:3. The method for intrusion detection of the Internet of Vehicles based on cloud-fog collaboration according to claim 1, wherein in the step 2, different computing tasks are allocated in the fog node and the cloud server to achieve collaboration, and the specific collaboration steps include: 步骤21,雾节点将数据进行二分类,分为正常数据和可疑数据。如果雾节点检测到正常数据,则在本地处理,减少发送到云服务器的数据,用于保护智能交通环境下的用户隐私数据。Step 21, the fog node classifies the data into two groups, normal data and suspicious data. If the fog node detects normal data, it will be processed locally to reduce the data sent to the cloud server to protect user privacy data in an intelligent transportation environment. 步骤22,在雾节点上,如果检测到的数据为异常数据,则雾节点将数据发送至云服务器。Step 22, on the fog node, if the detected data is abnormal data, the fog node sends the data to the cloud server. 步骤23,在云服务器上,代价敏感CNN算法对异常数据进行多分类,得到具体的攻击类型。Step 23: On the cloud server, the cost-sensitive CNN algorithm performs multi-classification on the abnormal data to obtain specific attack types. 步骤24,云服务器中的响应系统会将结果发送至雾节点端的管理员,管理员发现被感染的智能设备,并采取措施实现雾节点与云服务器的协同工作。In step 24, the response system in the cloud server will send the result to the administrator at the fog node side. The administrator finds the infected smart device and takes measures to realize the coordinated work between the fog node and the cloud server. 4.根据权利要求1所述的一种基于云雾协同的车联网入侵检测方法,其特征在于,所述步骤3中代价敏感CNN在CNN的softmax和loss层之间加入代价矩阵ξ,通过联合优化自动更新参数,具体包括:4. a kind of car networking intrusion detection method based on cloud-fog collaboration according to claim 1, is characterized in that, in described step 3, cost-sensitive CNN adds cost matrix ξ between softmax and loss layer of CNN, through joint optimization Automatically update parameters, including: 步骤31,雾节点筛选出来的可疑数据传递给代价敏感CNN算法,将数据标签更新,更改为具体的攻击标签。为减少类别不平衡对算法的影响,修改CNN的最后一层,在softmax和loss层之间加入一个代价矩阵;Step 31: The suspicious data screened by the fog node is passed to the cost-sensitive CNN algorithm, and the data label is updated to a specific attack label. In order to reduce the impact of class imbalance on the algorithm, modify the last layer of CNN and add a cost matrix between the softmax and loss layers; 步骤32,在计算分类损失之前,代价矩阵的结果被压缩到[0,1]之间,损失函数采用的是交叉熵损失函数;Step 32, before calculating the classification loss, the result of the cost matrix is compressed into [0, 1], and the loss function adopts the cross entropy loss function; 步骤33,代价矩阵ξ所添加的位置,在softmax的公式中
Figure FDA0002840861310000021
每一个元素的指数值前,都相应的乘上一个代价值,所有的代价值构成代价矩阵的值,其中softmax公式中on表示经过两层CNN的输出。
Step 33, the position where the cost matrix ξ is added, in the formula of softmax
Figure FDA0002840861310000021
Before the index value of each element, a cost value is correspondingly multiplied, and all the cost values constitute the value of the cost matrix, where on in the softmax formula represents the output of the two-layer CNN.
步骤34,使用交叉熵损失函数时,需要更新代价敏感CNN参数θ和代价矩阵参数ξ,采用联合优化方式更新θ和ξ;Step 34, when using the cross-entropy loss function, it is necessary to update the cost-sensitive CNN parameter θ and the cost matrix parameter ξ, and use a joint optimization method to update θ and ξ;
5.根据权利要求4所述的步骤34采用联合优化方式更新θ和ξ,具体包括:5. step 34 according to claim 4 adopts joint optimization mode to update θ and ξ, specifically comprising: 步骤51,对于θ的优化,使用误差反向传播的随机梯度下降。为了优化ξ,再次使用梯度下降算法来计算步长的方向来更新参数,具体如下;Step 51, for the optimization of θ, use stochastic gradient descent with error backpropagation. In order to optimize ξ, the gradient descent algorithm is used again to calculate the direction of the step size to update the parameters, as follows; 步骤52,创建代价敏感CNN网络,初始化神经网络参数θ,将代价矩阵,误差初始化设为1;Step 52: Create a cost-sensitive CNN network, initialize the neural network parameter θ, and set the cost matrix and error initialization to 1; 步骤53,epoch循环开始,直到达到最大epoch数;Step 53, the epoch cycle starts until the maximum number of epochs is reached; 步骤54,计算梯度grad(x,d,F(ξ)),更新梯度参数,其中,x为数据,d为数据标签;Step 54: Calculate the gradient grad(x, d, F(ξ)), update the gradient parameters, where x is the data and d is the data label; 步骤55,batch循环内,前向传播得到输出,反向传播得到梯度,更新网络参数,达到最大batch数,则退出该循环;Step 55, in the batch loop, the output is obtained by forward propagation, the gradient is obtained by back propagation, the network parameters are updated, and the loop is exited when the maximum number of batches is reached; 步骤56,前向传播得到误差,如果误差大于设定误差,则代价矩阵的学习率缩小100倍,更新误差;Step 56, the error is obtained by forward propagation, if the error is greater than the set error, the learning rate of the cost matrix is reduced by 100 times, and the error is updated; 步骤57,epoch循环停止,退出循环;Step 57, the epoch loop is stopped, and the loop is exited; 步骤58,得到代价矩阵参数ξ和学习参数θ最优值。利用待识别的特征向量数据集对代价敏感CNN算法进行训练,得到代价敏感CNN算法分类器。In step 58, the optimal values of the cost matrix parameter ξ and the learning parameter θ are obtained. The cost-sensitive CNN algorithm is trained using the feature vector dataset to be identified, and the cost-sensitive CNN algorithm classifier is obtained.
CN202011491452.6A 2020-12-17 2020-12-17 Cloud and mist cooperation-based intrusion detection method for Internet of vehicles Pending CN112804189A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011491452.6A CN112804189A (en) 2020-12-17 2020-12-17 Cloud and mist cooperation-based intrusion detection method for Internet of vehicles

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011491452.6A CN112804189A (en) 2020-12-17 2020-12-17 Cloud and mist cooperation-based intrusion detection method for Internet of vehicles

Publications (1)

Publication Number Publication Date
CN112804189A true CN112804189A (en) 2021-05-14

Family

ID=75806869

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011491452.6A Pending CN112804189A (en) 2020-12-17 2020-12-17 Cloud and mist cooperation-based intrusion detection method for Internet of vehicles

Country Status (1)

Country Link
CN (1) CN112804189A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115099858A (en) * 2022-06-27 2022-09-23 同济大学 A vehicle collaborative fog computing system based on multi-agent reinforcement learning
CN117319095A (en) * 2023-11-29 2023-12-29 杭州海康威视数字技术股份有限公司 Fuzzy logic-based threat light-weight collaborative detection method and device for Internet of things

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7818797B1 (en) * 2001-10-11 2010-10-19 The Trustees Of Columbia University In The City Of New York Methods for cost-sensitive modeling for intrusion detection and response
CN106611189A (en) * 2016-06-28 2017-05-03 四川用联信息技术有限公司 Method for constructing integrated classifier of standardized multi-dimensional cost sensitive decision-making tree
CN106611036A (en) * 2016-06-20 2017-05-03 四川用联信息技术有限公司 Improved multidimensional scaling heterogeneous cost-sensitive decision tree building method
CN109358608A (en) * 2018-11-28 2019-02-19 广东电网有限责任公司 A kind of transformer state methods of risk assessment and device based on integrated study

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7818797B1 (en) * 2001-10-11 2010-10-19 The Trustees Of Columbia University In The City Of New York Methods for cost-sensitive modeling for intrusion detection and response
CN106611036A (en) * 2016-06-20 2017-05-03 四川用联信息技术有限公司 Improved multidimensional scaling heterogeneous cost-sensitive decision tree building method
CN106611189A (en) * 2016-06-28 2017-05-03 四川用联信息技术有限公司 Method for constructing integrated classifier of standardized multi-dimensional cost sensitive decision-making tree
CN109358608A (en) * 2018-11-28 2019-02-19 广东电网有限责任公司 A kind of transformer state methods of risk assessment and device based on integrated study

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
丁艳军: "面向车联网的车辆攻击方法及入侵检测技术研究", 《中国优秀硕博士学位论文全文数据库(硕士)》 *
董伟豪: "云雾一体化软定义车联网架构和性能优化", 《中国优秀硕博士学位论文全文数据库(硕士)》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115099858A (en) * 2022-06-27 2022-09-23 同济大学 A vehicle collaborative fog computing system based on multi-agent reinforcement learning
CN117319095A (en) * 2023-11-29 2023-12-29 杭州海康威视数字技术股份有限公司 Fuzzy logic-based threat light-weight collaborative detection method and device for Internet of things
CN117319095B (en) * 2023-11-29 2024-02-13 杭州海康威视数字技术股份有限公司 Fuzzy logic-based threat light-weight collaborative detection method and device for Internet of things

Similar Documents

Publication Publication Date Title
Yang et al. MTH-IDS: A multitiered hybrid intrusion detection system for internet of vehicles
Li et al. Deep learning in security of internet of things
Khedr et al. FMDADM: A multi-layer DDoS attack detection and mitigation framework using machine learning for stateful SDN-based IoT networks
Azizjon et al. 1D CNN based network intrusion detection with normalization on imbalanced data
Yang et al. Tree-based intelligent intrusion detection system in internet of vehicles
Vu et al. Deep transfer learning for IoT attack detection
Vishwakarma et al. A new two-phase intrusion detection system with Naïve Bayes machine learning for data classification and elliptic envelop method for anomaly detection
Alladi et al. Artificial intelligence (AI)-empowered intrusion detection architecture for the internet of vehicles
Bangui et al. A hybrid machine learning model for intrusion detection in VANET
Sethi et al. Deep reinforcement learning based intrusion detection system for cloud infrastructure
Yue et al. An ensemble intrusion detection method for train ethernet consist network based on CNN and RNN
US10504038B2 (en) Refined learning data representation for classifiers
Polat et al. Deep network approach with stacked sparse autoencoders in detection of DDoS attacks on SDN‐based VANET
Anzer et al. A multilayer perceptron-based distributed intrusion detection system for internet of vehicles
Alkhatib et al. Unsupervised network intrusion detection system for AVTP in automotive ethernet networks
Meliboev et al. 1D CNN based network intrusion detection with normalization on imbalanced data
CN112804189A (en) Cloud and mist cooperation-based intrusion detection method for Internet of vehicles
Al-Khulaidi et al. Machine Learning for Intrusion Detection in Vehicular Ad-hoc Networks (VANETs): A Survey
Al-Fawa'reh et al. Detecting stealth-based attacks in large campus networks
Gouda et al. Graph Based Machine Learning for Anomaly Detection in IoT Security
Soares et al. Intrusion detection systems in VANET: A review on implementation techniques and datasets
Fazzolari et al. An explainable intrusion detection system for IoT networks
Guo et al. AdaBoost algorithm in trustworthy network for anomaly intrusion detection
Sonthalia et al. Using machine learning in software defined networks to recognize and avoid DDOS attacks
Korba et al. Zero-day botnet attack detection in iov: A modular approach using isolation forests and particle swarm optimization

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20210514