Abstract
In order to realize online detection and control of network viruses in robots, the authors propose a data mining-based anti-virus solution for smart robots. First, using internet of things (IoT) intrusion prevention system design method based on network intrusion signal detection and feedforward modulation filtering design, the overall design description and function analysis are carried out, and then the intrusion signal detection algorithm is designed, and finally, the hardware design and software development for a breach protection solution for the IoT are completed, and the integrated design of the system is realized. The findings demonstrated that based on the mean value of 10,000 tests, the IoT’s average packet loss rate is 0. Conclusion: This system has high accuracy, good performance, and strong compatibility and friendliness.
1 Introduction
In the course of social growth, computer technology has also been innovated, computer network virus technology has developed synchronously, and has even advanced to a higher level, causing great losses to computer network users due to the computer network infrastructures’ vulnerability to danger. Therefore, people began to pay attention to computer network virus defense technology [1]. Systems can effectively solve various current network virus problems and maintain security on computer network systems [2]. Computer network viruses spread rapidly, severely affecting network security and causing great damage [3]. At present, the mainstream anti-virus technology is signature technology, the biggest defect of this technology is that the code is fixed. In the face of changing viruses, the version needs to be updated continuously to ensure Internet security, and users are often in a passive defense state. Therefore, the future development trend of network virus detection is an intelligent active defense system.
A tight connection exists among computer networks and network viruses, the main ways of spreading network viruses include network e-mails, network system loopholes, and bad web pages, etc., which can deliberately damage computer network systems. The spread of computer network viruses is very rich, and the use of network system loopholes spreads network viruses. This kind of virus spread is relatively common. Computer network virus programs can use system loopholes to control each other’s computers, at the same time, viruses can also search and scan folders, implement virus replication, which can invade the network system [4].
In the early stages of technological advancements in computer networks, computer network viruses mainly interfered with the programming work of network technicians. With the speedy expansion of computer technology, the development technology and the functional role of computer network viruses have changed. Today the design and development of a number of computer network viruses have been commercialized and have the characteristics to destroy computer network systems. For example, illegally obtaining online bank account numbers and passwords for profit. Nowadays, computer networks are widely used in people’s daily life, people store various information on the network; therefore, computer security concerns must be taken seriously to avoid being harmed by computer network viruses [5]. Using data mining technology can, we can change the status quo of computer networks and improve the security of computers, provide conditions for the defense of network viruses, and greatly improve the defense level of computer network virus.
2 Literature review
Data mining mainly refers to analyzing and mining valuable information from massive information [6]. Figure 1 depicts the data extraction system’s organizational framework.
As can be seen from the Figure, the valuable data are analyzed and mined from the original data, take it as the target set, and then start from data selection, data preprocessing, data transformation, etc., are carried out. Comprehensive processing of data are done to reduce data dimensions and simplify data, so as to completely remove the useless data [6].
As the process by which viruses attack systems are becoming more and more advanced and sophisticated, people put forward higher requirements for system security defense performance. Under normal circumstances, once a computer network is invaded by a virus, lot of data present in the interconnected system are quickly tampered and destroyed by the virus; therefore, the relevant personnel should strictly follow the computer network virus defense process shown in Figure 2 to complete the system design. Because the data mining process is more complicated, during the application of data mining technology, relevant personnel must follow the defense process shown in Figure 2 to further improve the effect of virus defense and control [7].
The application environment that employs detectors and wireless connectivity has expanded more and more today with the development of wireless sensor network communication technology and Internet of Things (IoT) technology device terminals to transmit data and exchange information, forming a large-scale IoT communication system on the internet. Due to the widely distributed and self-organizing nature of IoT nodes, the IoT network environment is vulnerable to cyberattacks and intrusive viruses, in particular the penetration performance is more pronounced and the intrusion uses communication link vulnerability for identification [8]. The layers and middle layers of the IoT implement virus intrusions that pose a cybersecurity risk. IoT interference uncovering and prevention problems are studied, improving IoT security, and it has significant practical applications in network architecture and networking security of IoT. The related intrusion prevention system design methods are receiving great attention [9].
The IoT intrusion prevention and identification is based on the extraction of informational features and detection of intrusion signals at the time of intrusion. To develop and design intrusion prevention systems, high-speed digital signal processing chips were incorporated and specific research results were obtained. Among them, a method to design an IoT intrusion detection system was proposed on optimal avalanche gain control technology combined with a hardware development environment, to identify intrusion detection in the IoT environment. The intrusion detection accuracy is high, but as a result, the system design is prone to distortion and the intrusion detection accuracy is not high under the influence of strong interference [10]. Another researcher proposed a network intrusion HHT detection algorithm that introduced offset layer control, developed and designed an intrusion prevention system for the IoT using its high-performance chip, and obtained offset characteristics of network intrusion through sampling. Offset control is implemented and combined with the switch to perform the intrusion detection, the optimal design of the network intrusion prevention system is realized, and a good detection performance is achieved, but the computational cost of the intrusion prevention system is high and the real-time performance is poor. To solve these problems, the authors propose a method to develop an internet-wide signal detection-based protection solution for the IoT and design fixed point kernel forwarding modulation and filtering bits. First, the overall design of the intrusion prevention system is carried out, then the intrusion detection algorithm design is carried out, and finally, the hardware design and software development of the intrusion prevention system is carried out [11]. Anti-intrusion for IoT is implemented. By performance verification, the designed intrusion prevention system shows excellent performance in intrusion detection [12].
3 Methods
3.1 Overall design description and algorithm design of the system
3.1.1 Overall design of IoT-oriented intrusion prevention system
In order to get the best possible architecture for the intrusion prevention system for the Internet of things, the system's total structural model must be built first. The Internet of things routing link layer is the common network followed by the layer structure link that can be summarized. The protocol stack-space layer forms the cognitive layer and the middle layer of the Internet of Things. An intrusion prevention system is vulnerable to compromises from the cognitive layer's association vulnerabilities [13]. Intermediate layer performs virus intrusion detection and is mainly composed. Among them, the virus intrusion detection module is the core unit of the total defense system, and the intrusion prevention system for the IoT uses the embedded system to develop the integrated chip and handle it [14]. Information management and the use of wireless communication technology for data transmission and virus intrusion detection analyses the clock frequency that uses PCI bus technology for data acquisition and a 32-bit or 64-bit data line for power. The IoT consists of four primitive object entities as follows: target, observer node, sensor node, and perceptual field of view. Therefore, during the development and creation of an infrastructure that will avoid intrusions on the IoT, it is necessary to complete the various installations of the intrusion prevention system for the IoT through the central software configuration, such as routing settings, location tracking system settings, location tracking system settings, etc. When a network attack occurs or the power consumption ends, it accepts the interrupt request and when a hardware device or software instruction requests the interrupt, it sends the interrupt/IACK response signal to the register and ST1 state to perform intrusion detection. Figure 3 shows the structural block diagram of the IoT intrusion prevention system designed by the author according to the description of the general design ideas and analysis of the above functional criteria [15].
3.1.2 Sybil intrusion detection algorithm design
Based on the above construction of the overall design structure model of the
where
where
where
The IoT generates network fluctuations and jumps under attack. Using the pseudo-stationary random process analysis and processing method, the detection beam domain is obtained as follows:
where
where v represents the directional characteristic that satisfies the assumption of stationarity,
Therefore, the decomposition result of the beam directivity characteristic of the
The blind source separation method is used to perform intrusion detection under the time-frequency distribution, the scattering characteristic function at time t is
simplified to
where A is the reverberation amplitude of
3.2 System design and implementation
3.2.1 Hardware modular design of intrusion prevention system
The hardware design and software development of the intrusion prevention system are carried out according to the general layout of the structure and the formulation of the intrusion recognition algorithm. The system is designed in a modular manner, with the main components being the filtering circuit section and the primary controller, the circuit module AD circuit module, and sensor module. It uses a feed modulation filter to perform characteristic matching of intrusion detection and configure a filter circuit.
Using an IoT-oriented intrusion signal as the initial input, a simple filter format is provided.
where N(z) is the low-pass channel function of the “Sybil” intrusion prevention system, its zero point is at z = e(j_0), D(z) is the initial state of the equivalent low-pass channel, and from the frequency parameter a and bandwidth parameter r of the filter, the initial frequency and initial phase of the feedforward modulation filter are calculated as follows:
In the case that the measurement noises are not correlated with each other, through weighting, the high-frequency response characteristic function of the
Thus, the planned “Sybil” security system for intrusion prevention obtains the transfer function of the feedforward modulation filter.
When the constraints are met
The obtained output response feature is the largest, which can meet the performance requirements of
The main control circuit module is the control module for
Program load detection module of intrusion detection algorithm recognizes internal clock fluctuations and detect virus intrusion of Internet of Things intrusion prevention system. Digital Signal Processing chip is used to program loader circuit design. The loading program is a function to execute the programming of the intrusion detection algorithm. The reset circuit of the intrusion prevention system for the Internet of Things is taken from the serial TW1 memory. The TW1 is selected to store location information for performing intrusion detection.
3.2.2 Software development
The “Sybil” intrusion prevention system for the IoT’s technology is developed in accordance with the hardware architecture, the software development and processing program of the
3.2.3 Data storage module design
Data storage methods have certain diversity and complexity. By using the system background program, the extraction and reorganization of data packets can be realized, so as to obtain valuable data. Data storage mainly includes two methods, one is the data packet storage method, and the other is the message information storage method. For data files, in specific storage, it is necessary to extract valuable data according to the design of the data link layer, at the same time, it is necessary to complete the safe transmission and storage of data. When the relevant information data of the background data record are effectively stored in the database, it is necessary to visually present these data in front of the user with the help of the foreground interface, so that the user can view and call these data in time. The user data table used in the system is shown in Table 1.
Field name | Field description | Type of data | Allow nulls |
---|---|---|---|
Username | Log-in name | Varchar (15) | No |
Pass wd | Password |
|
Yes |
Account number | Account |
|
No |
Role | Optional fields | Varchar (15) | Yes |
4 Results and discussion
To evaluate the effectiveness of the “Sybil” preventive security structure for the Internet of Things, system debugging along with simulation tests are run, and the experiment’s detection technique is used and is implemented by “Matlab” programming.
As shown in Figure 5 below, it is difficult to effectively detect the intrusion signals under the interference of the network environment.
As can be seen in the figure, the author’s intrusion prevention system method can achieve accurate separation of intrusion information characteristics, high detection accuracy, and strong anti-interference ability. As shown in Figure 6, the average packet loss rate for information transport in the IoT is 0 per 10,000 attempts on average [19].
As shown in Figure 6, the proposed method is used to design an intrusion prevention system and by integrating the embedded design into the IoT and data transmission, the intrusion information is detected correctly, thus improving network security performance, and reducing data transmission packet loss rate. The tests show that the proposed design system has strong compatibility.
5 Conclusion
The author proposes the prevention of Malware attacks on computer networks via mining information technology. At the same time, the author studies the problem of intrusion prevention detection in the preventive system’s design process and the World Wide Web of Things attacks to strengthen the World Wide Web and IoT’ safety precautions. We recommend, based on network intrusion detection and 16-bit fixed-point, the Worldwide Web of Things DSP core design. First, the overall design description and functional analysis are performed, the intrusion detection algorithm is designed, the simulator is used to program the hardware online, and IoT software development of intrusion prevention system is carried out on the platform development and system integration design.
-
Funding information: The authors state no funding involved.
-
Author contributions: Jiao Ye and Hemant N. Patel provided the conceptualization, software requirement, contributed in methodology and wrote the first draft of the manuscript. Sankaranamasivayam Meena and Renato R. Maaliw III provided the data curation, contributed to the methodology and investigated the results. Samuel-Soma M. Ajibade and Ismail Keshta provided the figures, contributed in the methodology and reviewed the final draft of the manuscript.
-
Conflict of interest: Authors state no conflict of interest.
-
Data availability statement: Data shall be made available on request.
References
[1] Wang CL, Wang Y, Zeng ZY, Lin CY, Yu QL. Research on logistics distribution vehicle scheduling based on heuristic genetic algorithm. Complexity. 2021;2021(11):1–8.10.1155/2021/8275714Search in Google Scholar
[2] Mallik R, Sing D, Bandyopadhyay R. GPS tracking app for police to track ambulances carrying covid-19 patients for ensuring safe distancing. Trans Indian Natl Acad Eng. 2020;5(2):181–5.10.1007/s41403-020-00116-8Search in Google Scholar
[3] Ma J, Luo J. MDS symbol-pair codes from repeated-root cyclic codes. Designs Codes Cryptogr. 2022;90(1):121–37.10.1007/s10623-021-00967-4Search in Google Scholar
[4] Farooq Q, Shaukat Z, Zhou T, Aiman S, Li C. Inferring Virus-Host relationship between HPV and its host homo sapiens using protein interaction network. Sci Rep. 2020;10(1):8719.10.1038/s41598-020-65837-wSearch in Google Scholar PubMed PubMed Central
[5] Wang L, Wu P. Threshold dynamics of a zika model with environmental and sexual transmissions and spatial heterogeneity. Z Für Angew Mathematik Phys. 2022;73(4):1–22.10.1007/s00033-022-01812-xSearch in Google Scholar
[6] Reis F, Martins FB, Torres RR, Florêncio GWL, Cassemiro JM, Monteiro V, et al. Climate change impact on the initial development of tropical forest species: a multi-model assessment. Theor Appl Climatol. 2021;145(1):533–47.10.1007/s00704-021-03646-5Search in Google Scholar
[7] Liu J, Su Y, Lv S, Huang C. Detecting web spam based on novel features from web page source code. Secur Commun Netw. 2020;2020(5):1–14.10.1155/2020/6662166Search in Google Scholar
[8] Silwattananusarn T, Kulkanjanapiban P. Mining and analyzing patron’s book-loan data and university data to understand library use patterns. Int J Inf Sci Manag. 2020;18(2):151–72.Search in Google Scholar
[9] Conard NJ, Brenner M, Bretzke K, Will M. What do spatial data from sibhudu tell us about life in the middle stone age? Archaeologic Anthropologic Sci. 2022;14(8):1–22.10.1007/s12520-022-01585-4Search in Google Scholar
[10] Ramos E, Rosa UA, Ribeiro G, Villanova F, Leal E. High heterogeneity of echoviruses in Brazilian children with acute gastroenteritis. Viruses. 2021;13(4):595.10.3390/v13040595Search in Google Scholar PubMed PubMed Central
[11] Boonsong W, Ismail W, Shinohara N, Mahdaliza S, Darul J. Real-time water quality monitoring of aquaculture pond using wireless sensor network and internet of things. J Theor Appl Inf Technol. 2020;98(22):22.Search in Google Scholar
[12] Fotohi R, Abdan M, Ghasemi S. A self-adaptive intrusion detection system for securing UAV-to-UAV communications based on the human immune system in UAV networks. J Grid Comput. 2022;20(3):1–26.10.1007/s10723-022-09614-1Search in Google Scholar
[13] Li B, Ge W, Liu D, Tan C, Sun B. Optimization method of vehicle handling stability based on response surface model with d-optimal test design. J Mech Sci Technol. 2020;34(6):2267–76.10.1007/s12206-020-0502-zSearch in Google Scholar
[14] Wang A, Wang W, Zhou H, Zhang J. Network intrusion detection algorithm combined with group convolution network and snapshot ensemble. Symmetry. 2021;13(10):1814.10.3390/sym13101814Search in Google Scholar
[15] Sharma A, Kumar R, Talib M, Srivastava S, Iqbal R. Network modelling and computation of quickest path for service-level agreements using bi-objective optimization. Int J Distrib Sens Netw. 2019;15:155014771988111.10.1177/1550147719881116Search in Google Scholar
[16] Raj MP, Manimegalai P, Ajay P, Amose J. Lipid data acquisition for devices treatment of coronary diseases health stuff on the internet of medical things. J Phys Conf Ser. 2021;1937:012038.10.1088/1742-6596/1937/1/012038Search in Google Scholar
[17] Zhao XL, Liu X, Liu J, Chen J, Fu S, Zhong F. The effect of ionization energy and hydrogen weight fraction on the non-thermal plasma VOCs removal efficiency. J Phys D Appl Phys. 2019;52(14):145201.10.1088/1361-6463/aafe8bSearch in Google Scholar
[18] Huang R, Yang X. Analysis and research hotspots of ceramic materials in textile application. J Ceram Process Res. 2022;23(3):312–9.Search in Google Scholar
[19] Liu C, Lin M, Rauf H, Shareef S. Parameter simulation of multidimensional urban landscape design based on nonlinear theory. Nonlinear Eng. 2021;10(1):583–91.10.1515/nleng-2021-0049Search in Google Scholar
© 2023 the author(s), published by De Gruyter
This work is licensed under the Creative Commons Attribution 4.0 International License.