Advertisement

Wireless Network Attack Defense Algorithm Using Deep Neural Network in Internet of Things Environment

  • Xifeng WangEmail author
  • Xiaoluan Zhang
Article

Abstract

Aiming at the nonlinearity and uncertainty of the information security threat risk assessment system in the IoT environment, a wireless network attack defense method using deep neural network combined with game model is designed. Firstly, according to the topology information of the network, the reachability relationship and the vulnerability information of the network, the method generates the state attack and defense map of the network. Based on the state attack and defense map, based on the non-cooperative non-zero-sum game model, an optimal attack and defense decision algorithm is proposed. Combined with the prevention and control measures of the vulnerable points, the optimal attack and defense model is generated. Then, the information security risk factor index is quantified by the fuzzy system, and the output of the fuzzy system is input into the radial basis function (RBF) neural network model. The particle swarm optimization algorithm is used to optimize and train the parameters of the RBF neural network. Finally, an optimized defense model is obtained. The simulation results show that the wireless network attack defense algorithm using deep neural network combined with game model can solve the defects of subjective randomness and fuzzy conclusion of traditional wireless network attack defense methods. The average error is less than 2%, and it is more traditional than Machine learning algorithms have higher fitting accuracy, greater learning ability, and faster convergence.

Keywords

Internet of things Game model Mobile RFID network Wireless network attack defense algorithm RBF neural network 

Notes

References

  1. 1.
    J. Tang, C. Deng, G. B. Huang, et al., Compressed-domain ship detection on spaceborne optical image using deep neural network and extreme learning machine, IEEE Transactions on Geoscience & Remote Sensing, Vol. 53, No. 3, pp. 1174–1185, 2014.CrossRefGoogle Scholar
  2. 2.
    S. Sivasankaran, A. A., Nugraha, E., Vincent, et al., Robust ASR using neural network based speech enhancement and feature simulation. In IEEE Workshop on Automatic Speech Recognition & Understanding, 2015.Google Scholar
  3. 3.
    I. O. Words, Oil well characterization and artificial gas lift optimization using neural networks combined with genetic algorithm, Discrete Dynamics in Nature and Society, Vol. 2014, No. 2, pp. 161–177, 2014.Google Scholar
  4. 4.
    H. Li, L. Zhang, X. Zhou, et al., Cost-sensitive sequential three-way decision modeling using a deep neural network, International Journal of Approximate Reasoning., Vol. 85, No. C, pp. 68–78, 2017.MathSciNetCrossRefzbMATHGoogle Scholar
  5. 5.
    P. Li, M. Chen, F. Hu, et al., A spectrogram-based voiceprint recognition using deep neural network. In Control & Decision Conference, 2015.Google Scholar
  6. 6.
    S. Fang, Y. Liu, W. Shen, et al., Virtual multipath attack and defense for location distinction in wireless networks, IEEE Transactions on Mobile Computing, Vol. 16, No. 2, pp. 566–580, 2017.CrossRefGoogle Scholar
  7. 7.
    D. Garcia, A. E. Lugo, E. Hemberg, et al., In ACM Press the Genetic and Evolutionary Computation Conference Companion—Berlin, Germany (2017.07.15–2017.07.19)] Proceedings of the Genetic and Evolutionary Computation Conference Companion on,—GECCO\”17—Investigating coevolutionary archive based genetic algorithms on cyber defense networks//Genetic & Evolutionary Computation Conference Companion, pages 1455–1462, 2017.Google Scholar
  8. 8.
    A. Authors, AD V-BNN: Improved adversarial deffense through robust Bayesian neural network, 2018.Google Scholar
  9. 9.
    P. Tanabe, C. Reddin, V. L. Thornton, et al., Emergency department sickle cell assessment of needs and strengths (ED-SCANS), a focus group and decision support tool development project, Academic Emergency Medicine Official Journal of the Society for Academic Emergency Medicine, Vol. 17, No. 8, pp. 848–858, 2014.CrossRefGoogle Scholar
  10. 10.
    S. J. Chang, J. Y. Lee, B. P. Jin, et al., An online fault tolerant actor-critic neuro-control for a class of nonlinear systems using neural network HJB approach, International Journal of Control Automation & Systems, Vol. 13, No. 2, pp. 311–318, 2015.CrossRefGoogle Scholar
  11. 11.
    Z. Qi, Y. Tian and S. Yong, A new classification model using privileged information and its application, Neurocomputing, Vol. 129, No. 4, pp. 146–152, 2014.CrossRefGoogle Scholar
  12. 12.
    A. Thanda, and S. M. Venkatesan, Audio visual speech recognition using deep recurrent neural networks. In IAPR Workshop on Multimodal Pattern Recognition of Social Signals in Human–Computer Interaction. 2016.Google Scholar
  13. 13.
    J. Du, Z. R. Wang, J. F. Zhai, et al., Deep neural network based hidden Markov model for offline handwritten Chinese text recognition. In International Conference on Pattern Recognition, 2016.Google Scholar
  14. 14.
    S. Woo, and C. Lee, Feature extraction for deep neural networks based on decision boundaries. In SPIE Defense + Security, 2017.Google Scholar
  15. 15.
    N. Zhen, Q. Li and L. Gang, Game-model-based network security risk control, Computer, Vol. 51, No. 4, pp. 28–38, 2018.CrossRefGoogle Scholar
  16. 16.
    Le L, Hao J, Xie Y, et al., Deep kernel: learning kernel function from data using deep neural network. In IEEE/ACM International Conference on Big Data Computing Applications & Technologies, 2017.Google Scholar
  17. 17.
    P. O. Glauner, Deep convolutional neural networks for smile recognition, IEEE/ACM Transactions on Audio Speech & Language Processing, Vol. 22, No. 10, pp. 1533–1545, 2015.Google Scholar
  18. 18.
    X. Xu, and S. Todorovic, Beam search for learning a deep convolutional neural network of 3D shapes. In International Conference on Pattern Recognition, 2017.Google Scholar
  19. 19.
    G. Liu, H. Zhang and Q. Li, Network security optimal attack and defense decision-making method based on game model, Journal of Nanjing University of Science & Technology, Vol. 38, No. 1, pp. 12–21, 2014.Google Scholar
  20. 20.
    T. Kooi, B. Ginneken, N. Karssemeijer, et al., Discriminating solitary cysts from soft tissue lesions in mammography using a pretrained deep convolutional neural network, Medical Physics, Vol. 44, No. 3, pp. 1017–1027, 2017.CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.School of ComputerBaoji University of Arts and SciencesBaojiChina

Personalised recommendations