Skip to content
BY 4.0 license Open Access Published by De Gruyter September 22, 2023

Smart robots’ virus defense using data mining technology

  • Jiao Ye , Hemant N. Patel , Sankaranamasivayam Meena , Renato R. Maaliw EMAIL logo , Samuel-Soma M. Ajibade and Ismail Keshta

Abstract

In order to realize online detection and control of network viruses in robots, the authors propose a data mining-based anti-virus solution for smart robots. First, using internet of things (IoT) intrusion prevention system design method based on network intrusion signal detection and feedforward modulation filtering design, the overall design description and function analysis are carried out, and then the intrusion signal detection algorithm is designed, and finally, the hardware design and software development for a breach protection solution for the IoT are completed, and the integrated design of the system is realized. The findings demonstrated that based on the mean value of 10,000 tests, the IoT’s average packet loss rate is 0. Conclusion: This system has high accuracy, good performance, and strong compatibility and friendliness.

1 Introduction

In the course of social growth, computer technology has also been innovated, computer network virus technology has developed synchronously, and has even advanced to a higher level, causing great losses to computer network users due to the computer network infrastructures’ vulnerability to danger. Therefore, people began to pay attention to computer network virus defense technology [1]. Systems can effectively solve various current network virus problems and maintain security on computer network systems [2]. Computer network viruses spread rapidly, severely affecting network security and causing great damage [3]. At present, the mainstream anti-virus technology is signature technology, the biggest defect of this technology is that the code is fixed. In the face of changing viruses, the version needs to be updated continuously to ensure Internet security, and users are often in a passive defense state. Therefore, the future development trend of network virus detection is an intelligent active defense system.

A tight connection exists among computer networks and network viruses, the main ways of spreading network viruses include network e-mails, network system loopholes, and bad web pages, etc., which can deliberately damage computer network systems. The spread of computer network viruses is very rich, and the use of network system loopholes spreads network viruses. This kind of virus spread is relatively common. Computer network virus programs can use system loopholes to control each other’s computers, at the same time, viruses can also search and scan folders, implement virus replication, which can invade the network system [4].

In the early stages of technological advancements in computer networks, computer network viruses mainly interfered with the programming work of network technicians. With the speedy expansion of computer technology, the development technology and the functional role of computer network viruses have changed. Today the design and development of a number of computer network viruses have been commercialized and have the characteristics to destroy computer network systems. For example, illegally obtaining online bank account numbers and passwords for profit. Nowadays, computer networks are widely used in people’s daily life, people store various information on the network; therefore, computer security concerns must be taken seriously to avoid being harmed by computer network viruses [5]. Using data mining technology can, we can change the status quo of computer networks and improve the security of computers, provide conditions for the defense of network viruses, and greatly improve the defense level of computer network virus.

2 Literature review

Data mining mainly refers to analyzing and mining valuable information from massive information [6]. Figure 1 depicts the data extraction system’s organizational framework.

Figure 1 
               Data mining system structure.
Figure 1

Data mining system structure.

As can be seen from the Figure, the valuable data are analyzed and mined from the original data, take it as the target set, and then start from data selection, data preprocessing, data transformation, etc., are carried out. Comprehensive processing of data are done to reduce data dimensions and simplify data, so as to completely remove the useless data [6].

As the process by which viruses attack systems are becoming more and more advanced and sophisticated, people put forward higher requirements for system security defense performance. Under normal circumstances, once a computer network is invaded by a virus, lot of data present in the interconnected system are quickly tampered and destroyed by the virus; therefore, the relevant personnel should strictly follow the computer network virus defense process shown in Figure 2 to complete the system design. Because the data mining process is more complicated, during the application of data mining technology, relevant personnel must follow the defense process shown in Figure 2 to further improve the effect of virus defense and control [7].

Figure 2 
               Robot network virus defense process.
Figure 2

Robot network virus defense process.

The application environment that employs detectors and wireless connectivity has expanded more and more today with the development of wireless sensor network communication technology and Internet of Things (IoT) technology device terminals to transmit data and exchange information, forming a large-scale IoT communication system on the internet. Due to the widely distributed and self-organizing nature of IoT nodes, the IoT network environment is vulnerable to cyberattacks and intrusive viruses, in particular the penetration performance is more pronounced and the intrusion uses communication link vulnerability for identification [8]. The layers and middle layers of the IoT implement virus intrusions that pose a cybersecurity risk. IoT interference uncovering and prevention problems are studied, improving IoT security, and it has significant practical applications in network architecture and networking security of IoT. The related intrusion prevention system design methods are receiving great attention [9].

The IoT intrusion prevention and identification is based on the extraction of informational features and detection of intrusion signals at the time of intrusion. To develop and design intrusion prevention systems, high-speed digital signal processing chips were incorporated and specific research results were obtained. Among them, a method to design an IoT intrusion detection system was proposed on optimal avalanche gain control technology combined with a hardware development environment, to identify intrusion detection in the IoT environment. The intrusion detection accuracy is high, but as a result, the system design is prone to distortion and the intrusion detection accuracy is not high under the influence of strong interference [10]. Another researcher proposed a network intrusion HHT detection algorithm that introduced offset layer control, developed and designed an intrusion prevention system for the IoT using its high-performance chip, and obtained offset characteristics of network intrusion through sampling. Offset control is implemented and combined with the switch to perform the intrusion detection, the optimal design of the network intrusion prevention system is realized, and a good detection performance is achieved, but the computational cost of the intrusion prevention system is high and the real-time performance is poor. To solve these problems, the authors propose a method to develop an internet-wide signal detection-based protection solution for the IoT and design fixed point kernel forwarding modulation and filtering bits. First, the overall design of the intrusion prevention system is carried out, then the intrusion detection algorithm design is carried out, and finally, the hardware design and software development of the intrusion prevention system is carried out [11]. Anti-intrusion for IoT is implemented. By performance verification, the designed intrusion prevention system shows excellent performance in intrusion detection [12].

3 Methods

3.1 Overall design description and algorithm design of the system

3.1.1 Overall design of IoT-oriented intrusion prevention system

In order to get the best possible architecture for the intrusion prevention system for the Internet of things, the system's total structural model must be built first. The Internet of things routing link layer is the common network followed by the layer structure link that can be summarized. The protocol stack-space layer forms the cognitive layer and the middle layer of the Internet of Things. An intrusion prevention system is vulnerable to compromises from the cognitive layer's association vulnerabilities [13]. Intermediate layer performs virus intrusion detection and is mainly composed. Among them, the virus intrusion detection module is the core unit of the total defense system, and the intrusion prevention system for the IoT uses the embedded system to develop the integrated chip and handle it [14]. Information management and the use of wireless communication technology for data transmission and virus intrusion detection analyses the clock frequency that uses PCI bus technology for data acquisition and a 32-bit or 64-bit data line for power. The IoT consists of four primitive object entities as follows: target, observer node, sensor node, and perceptual field of view. Therefore, during the development and creation of an infrastructure that will avoid intrusions on the IoT, it is necessary to complete the various installations of the intrusion prevention system for the IoT through the central software configuration, such as routing settings, location tracking system settings, location tracking system settings, etc. When a network attack occurs or the power consumption ends, it accepts the interrupt request and when a hardware device or software instruction requests the interrupt, it sends the interrupt/IACK response signal to the register and ST1 state to perform intrusion detection. Figure 3 shows the structural block diagram of the IoT intrusion prevention system designed by the author according to the description of the general design ideas and analysis of the above functional criteria [15].

Figure 3 
                     The block diagram of the 
                           
                              
                              
                                 Sybil
                              
                              \text{Sybil}
                           
                         intrusion prevention system for the IoT.
Figure 3

The block diagram of the Sybil intrusion prevention system for the IoT.

3.1.2 Sybil intrusion detection algorithm design

Based on the above construction of the overall design structure model of the Sybil intrusion prevention system for the IoT, the design and system development are carried out. Sybil intrusion prevention system design includes algorithm design, hardware design, and software design. Here the algorithm design of Sybil intrusion prevention system is first carried out. The detection algorithm is based on the signal processing algorithm. Through the construction of Sybil intrusion signal model [16], combined with signal feature extraction and detection algorithm, intrusion detection is carried out in the IoT environment. The signal model expression for Sybil intrusion is given as follows:

(1) z ( t ) = s ( t ) + js ( t ) h ( t ) = s ( t ) + j + s ( u ) t u d u = s ( t ) + jH [ s ( t ) ] ,

where s ( t ) is the clockwise amplitude of the Sybil intrusion signal z ( t ) , also called the envelope; h ( t ) is the mapping phase from frequency domain to time domain, Z ( f ) can be obtained by wavelet transform from S ( f ) , H ( f ) is the local (or domain) stationary length of the Sybil intrusion signal. Sybil frequency component of an intrusion signal is a set of non-stationary random signals, and the spectrum of the signal is time-varying and nonlinear. Assuming that the short time interval of Sybil intrusion is defined as v m , m [ 1 , n ] , the power spectrum writing at different moments in the Sybil invasion process is calculated.

(2) y ( t ) = τ φ b ( τ , φ ) exp [ j 2 π φ t ] f ( t τ ) d t d φ ,

where b ( τ , φ ) is the non-stationary spread function, f ( t ) is the frequency component in the vicinity of the window, τ is the short-time Fourie r-delay, and φ is the frequency shift characteristic of the Sybil intrusion signal with time. Assuming that Sybil virus data are in the IoT attack, the signal in the vicinity of its window is randomly phase-expanded, and the time-domain expansion function of the output signal is as follows:

(3) y ( t ) = a , b ρ ( a , b ) 1 | a | f t b a d a d b a 2 ,

where f ( t ) is the non-stationary spectrum of the Sybil intrusion signal, ρ ( a , b ) is the pseudo-stationary spread function, a is the spectral density, and b is the delay parameter. In order to improve the detection performance, power spectral density weighting is adopted, and the weighting coefficient b 0 = 0 , c k is utilizing an appropriate short-time windows operation, and a short-time windows functionality for adaptive detection, the power spectral density characteristics of the detection output are obtained as follows:

(4) y ( t ) = 1 c f W f y ( a , b ) 1 | a | f t b a d a d b a 2 .

The IoT generates network fluctuations and jumps under attack. Using the pseudo-stationary random process analysis and processing method, the detection beam domain is obtained as follows:

(5) c f = + | F ( ω ) | 2 ω d ω < ,

where F ( ω ) is the Fourier transform of f ( t ) , and the constant c f is the beam high-order cumulative characteristic function of function f ( t ) . Through high-order cumulant feature extraction, the complex envelopes of Sybil intrusion features are obtained as follows:

(6) s ( v ) = 0 v sin π 2 x 2 d x ,

(7) y ( t ) = u ( s ( t τ ) ) exp ( j ω C s ( t τ ) ) ,

where v represents the directional characteristic that satisfies the assumption of stationarity, u ( t ) is the complex envelope, and ω C is the energy density. For a wideband Sybil intrusion signal, the directional gain is

(8) c ( v ) = 0 v cos π 2 x 2 d x .

Therefore, the decomposition result of the beam directivity characteristic of the Sybil intrusion signal is obtained as follows:

(9) | s ( f ) | = A 1 2 k { [ c ( v 1 ) + c ( v 2 ) ] 2 + [ s ( v 1 ) + s ( v 2 ) ] 2 } .

The blind source separation method is used to perform intrusion detection under the time-frequency distribution, the scattering characteristic function at time t is

(10) P i ( t ) = n = 1 N A r e jkr R in 1 r e ikr ,

simplified to

(11) P i ( t ) = A r 2 n = 1 N e j 2 kr a in e j ψ in ,

where A is the reverberation amplitude of Sybil intrusion, r is the initial frequency of the signal, k = B T is the total energy of the signal, and e is the FM signal bandwidth. According to the above detection algorithm design, the program design of Sybil intrusion detection is carried out, the detection module design of Sybil intrusion prevention system is carried out through the program loading module [17].

3.2 System design and implementation

3.2.1 Hardware modular design of intrusion prevention system

The hardware design and software development of the intrusion prevention system are carried out according to the general layout of the structure and the formulation of the intrusion recognition algorithm. The system is designed in a modular manner, with the main components being the filtering circuit section and the primary controller, the circuit module AD circuit module, and sensor module. It uses a feed modulation filter to perform characteristic matching of intrusion detection and configure a filter circuit.

Using an IoT-oriented intrusion signal as the initial input, a simple filter format is provided.

(12) H ( z ) = N ( z ) D ( z ) ,

where N(z) is the low-pass channel function of the “Sybil” intrusion prevention system, its zero point is at z = e(j_0), D(z) is the initial state of the equivalent low-pass channel, and from the frequency parameter a and bandwidth parameter r of the filter, the initial frequency and initial phase of the feedforward modulation filter are calculated as follows:

(13) ω 0 = arc cos a 2 .

In the case that the measurement noises are not correlated with each other, through weighting, the high-frequency response characteristic function of the Sybil intrusion detection feedforward filter is obtained as follows:

(14) e j π = V ( e j ω 0 ) = sin θ 2 + sin θ 1 ( 1 + sin θ 2 ) e j ω 0 + e j 2 ω 0 1 + sin θ 1 ( 1 + sin θ 2 ) e j ω 0 + sin θ 2 e j 2 ω 0 .

Thus, the planned “Sybil” security system for intrusion prevention obtains the transfer function of the feedforward modulation filter.

(15) H ( z ) = 1 2 [ 1 + V ( z ) ] V ( e j ω ) + e j Φ ( ω ) .

When the constraints are met

(16) TW c 2 | v | , 2 v c 1 .

The obtained output response feature is the largest, which can meet the performance requirements of Sybil intrusion detection.

The main control circuit module is the control module for Sybil intrusion prevention detection. Using 16-bit fixed point as the control chip, the main control circuit module has 8 32-bit timer/counter functions, adopts ADG 3301 for AD / DA conversion, and through AC coupling, using PCI 9054 ’s LOCAL bus design method, the data collection of the Sybil intrusion prevention system oriented to the IoT is carried out.

Program load detection module of intrusion detection algorithm recognizes internal clock fluctuations and detect virus intrusion of Internet of Things intrusion prevention system. Digital Signal Processing chip is used to program loader circuit design. The loading program is a function to execute the programming of the intrusion detection algorithm. The reset circuit of the intrusion prevention system for the Internet of Things is taken from the serial TW1 memory. The TW1 is selected to store location information for performing intrusion detection.

3.2.2 Software development

The “Sybil” intrusion prevention system for the IoT’s technology is developed in accordance with the hardware architecture, the software development and processing program of the Sybil intrusion prevention system is carried out under the CCS 2.20 development platform. Using “C5409A XDS510 Emulator” for hardware online programming to realize the writing of detection algorithm and reading of data graph. The read and write operations are driven by the program of the system through the DMA controller. In Sybil intrusion prevention detection, the program is divided into user mode and kernel mode, which are generated by assembly and linking out file, intrusion prevention detection through WDM driver, and underlying hardware [18].

3.2.3 Data storage module design

Data storage methods have certain diversity and complexity. By using the system background program, the extraction and reorganization of data packets can be realized, so as to obtain valuable data. Data storage mainly includes two methods, one is the data packet storage method, and the other is the message information storage method. For data files, in specific storage, it is necessary to extract valuable data according to the design of the data link layer, at the same time, it is necessary to complete the safe transmission and storage of data. When the relevant information data of the background data record are effectively stored in the database, it is necessary to visually present these data in front of the user with the help of the foreground interface, so that the user can view and call these data in time. The user data table used in the system is shown in Table 1.

Table 1

User data sheet

Field name Field description Type of data Allow nulls
Username Log-in name Varchar (15) No
Pass wd Password Varchar ( 15 ) Yes
Account number Account Varchar ( 15 ) No
Role Optional fields Varchar (15) Yes

4 Results and discussion

To evaluate the effectiveness of the “Sybil” preventive security structure for the Internet of Things, system debugging along with simulation tests are run, and the experiment’s detection technique is used and is implemented by “Matlab” programming. Sybil intrusion signal center frequency test is f 0 = 1,000 Hz , the discrete sampling rate of Sybil intrusion data information is f s = 10 × f 0 Hz = 10 kHz , the bandwidth of serial port control is B = 1,000 Hz . In the above design, the WIN32 API function CreateFile () function is used to open the PCI device to execute the detection program loading, the simulation of network intrusion detection is realized, and the original data time domain waveform of Sybil intrusion signal detection oriented to the IoT is obtained as shown in Figure 4.

Figure 4 
               The original data waveform of IoT data acquisition.
Figure 4

The original data waveform of IoT data acquisition.

As shown in Figure 5 below, it is difficult to effectively detect the intrusion signals under the interference of the network environment.

Figure 5 
               Signal separation results of 
                     
                        
                        
                           Sybil
                        
                        \text{Sybil}
                     
                   intrusion detection.
Figure 5

Signal separation results of Sybil intrusion detection.

As can be seen in the figure, the author’s intrusion prevention system method can achieve accurate separation of intrusion information characteristics, high detection accuracy, and strong anti-interference ability. As shown in Figure 6, the average packet loss rate for information transport in the IoT is 0 per 10,000 attempts on average [19].

Figure 6 
               Performance comparison.
Figure 6

Performance comparison.

As shown in Figure 6, the proposed method is used to design an intrusion prevention system and by integrating the embedded design into the IoT and data transmission, the intrusion information is detected correctly, thus improving network security performance, and reducing data transmission packet loss rate. The tests show that the proposed design system has strong compatibility.

5 Conclusion

The author proposes the prevention of Malware attacks on computer networks via mining information technology. At the same time, the author studies the problem of intrusion prevention detection in the preventive system’s design process and the World Wide Web of Things attacks to strengthen the World Wide Web and IoT’ safety precautions. We recommend, based on network intrusion detection and 16-bit fixed-point, the Worldwide Web of Things DSP core design. First, the overall design description and functional analysis are performed, the intrusion detection algorithm is designed, the simulator is used to program the hardware online, and IoT software development of intrusion prevention system is carried out on the platform development and system integration design.

  1. Funding information: The authors state no funding involved.

  2. Author contributions: Jiao Ye and Hemant N. Patel provided the conceptualization, software requirement, contributed in methodology and wrote the first draft of the manuscript. Sankaranamasivayam Meena and Renato R. Maaliw III provided the data curation, contributed to the methodology and investigated the results. Samuel-Soma M. Ajibade and Ismail Keshta provided the figures, contributed in the methodology and reviewed the final draft of the manuscript.

  3. Conflict of interest: Authors state no conflict of interest.

  4. Data availability statement: Data shall be made available on request.

References

[1] Wang CL, Wang Y, Zeng ZY, Lin CY, Yu QL. Research on logistics distribution vehicle scheduling based on heuristic genetic algorithm. Complexity. 2021;2021(11):1–8.10.1155/2021/8275714Search in Google Scholar

[2] Mallik R, Sing D, Bandyopadhyay R. GPS tracking app for police to track ambulances carrying covid-19 patients for ensuring safe distancing. Trans Indian Natl Acad Eng. 2020;5(2):181–5.10.1007/s41403-020-00116-8Search in Google Scholar

[3] Ma J, Luo J. MDS symbol-pair codes from repeated-root cyclic codes. Designs Codes Cryptogr. 2022;90(1):121–37.10.1007/s10623-021-00967-4Search in Google Scholar

[4] Farooq Q, Shaukat Z, Zhou T, Aiman S, Li C. Inferring Virus-Host relationship between HPV and its host homo sapiens using protein interaction network. Sci Rep. 2020;10(1):8719.10.1038/s41598-020-65837-wSearch in Google Scholar PubMed PubMed Central

[5] Wang L, Wu P. Threshold dynamics of a zika model with environmental and sexual transmissions and spatial heterogeneity. Z Für Angew Mathematik Phys. 2022;73(4):1–22.10.1007/s00033-022-01812-xSearch in Google Scholar

[6] Reis F, Martins FB, Torres RR, Florêncio GWL, Cassemiro JM, Monteiro V, et al. Climate change impact on the initial development of tropical forest species: a multi-model assessment. Theor Appl Climatol. 2021;145(1):533–47.10.1007/s00704-021-03646-5Search in Google Scholar

[7] Liu J, Su Y, Lv S, Huang C. Detecting web spam based on novel features from web page source code. Secur Commun Netw. 2020;2020(5):1–14.10.1155/2020/6662166Search in Google Scholar

[8] Silwattananusarn T, Kulkanjanapiban P. Mining and analyzing patron’s book-loan data and university data to understand library use patterns. Int J Inf Sci Manag. 2020;18(2):151–72.Search in Google Scholar

[9] Conard NJ, Brenner M, Bretzke K, Will M. What do spatial data from sibhudu tell us about life in the middle stone age? Archaeologic Anthropologic Sci. 2022;14(8):1–22.10.1007/s12520-022-01585-4Search in Google Scholar

[10] Ramos E, Rosa UA, Ribeiro G, Villanova F, Leal E. High heterogeneity of echoviruses in Brazilian children with acute gastroenteritis. Viruses. 2021;13(4):595.10.3390/v13040595Search in Google Scholar PubMed PubMed Central

[11] Boonsong W, Ismail W, Shinohara N, Mahdaliza S, Darul J. Real-time water quality monitoring of aquaculture pond using wireless sensor network and internet of things. J Theor Appl Inf Technol. 2020;98(22):22.Search in Google Scholar

[12] Fotohi R, Abdan M, Ghasemi S. A self-adaptive intrusion detection system for securing UAV-to-UAV communications based on the human immune system in UAV networks. J Grid Comput. 2022;20(3):1–26.10.1007/s10723-022-09614-1Search in Google Scholar

[13] Li B, Ge W, Liu D, Tan C, Sun B. Optimization method of vehicle handling stability based on response surface model with d-optimal test design. J Mech Sci Technol. 2020;34(6):2267–76.10.1007/s12206-020-0502-zSearch in Google Scholar

[14] Wang A, Wang W, Zhou H, Zhang J. Network intrusion detection algorithm combined with group convolution network and snapshot ensemble. Symmetry. 2021;13(10):1814.10.3390/sym13101814Search in Google Scholar

[15] Sharma A, Kumar R, Talib M, Srivastava S, Iqbal R. Network modelling and computation of quickest path for service-level agreements using bi-objective optimization. Int J Distrib Sens Netw. 2019;15:155014771988111.10.1177/1550147719881116Search in Google Scholar

[16] Raj MP, Manimegalai P, Ajay P, Amose J. Lipid data acquisition for devices treatment of coronary diseases health stuff on the internet of medical things. J Phys Conf Ser. 2021;1937:012038.10.1088/1742-6596/1937/1/012038Search in Google Scholar

[17] Zhao XL, Liu X, Liu J, Chen J, Fu S, Zhong F. The effect of ionization energy and hydrogen weight fraction on the non-thermal plasma VOCs removal efficiency. J Phys D Appl Phys. 2019;52(14):145201.10.1088/1361-6463/aafe8bSearch in Google Scholar

[18] Huang R, Yang X. Analysis and research hotspots of ceramic materials in textile application. J Ceram Process Res. 2022;23(3):312–9.Search in Google Scholar

[19] Liu C, Lin M, Rauf H, Shareef S. Parameter simulation of multidimensional urban landscape design based on nonlinear theory. Nonlinear Eng. 2021;10(1):583–91.10.1515/nleng-2021-0049Search in Google Scholar

Received: 2023-05-22
Revised: 2023-06-16
Accepted: 2023-07-28
Published Online: 2023-09-22

© 2023 the author(s), published by De Gruyter

This work is licensed under the Creative Commons Attribution 4.0 International License.

Downloaded on 12.5.2024 from https://www.degruyter.com/document/doi/10.1515/jisys-2023-0065/html
Scroll to top button