• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
搜索

Author:

Li, Jianjun (Li, Jianjun.) | Wang, Wanjiang (Wang, Wanjiang.) | Chen, Peng (Chen, Peng.) | Zhang, Shuai (Zhang, Shuai.) | Zhang, Lihong (Zhang, Lihong.) | Li, Wei (Li, Wei.) | Dong, Huiliang (Dong, Huiliang.)

Indexed by:

EI Scopus

Abstract:

In the era of industrial Internet,different manufacturers hope to get a more perfect security detection model by sharing local data.However,after accessing the Internet,local data is more vulnerable to theft,and federated learning can achieve the purpose of data privacy protection and sharing by exchanging model parameters.To solve the defects in the existing methods for industrial computer security detection,a distributed security detection method for industrial personal computer service behavior based on federated learning was proposed,including industrial personal computer service behavior feature detection method,federated learning model aggregation method based on information entropy distribution weight and data transmission reconstruction method based on forwarding hardware.The above method could improve the attack identification accuracy of industrial control application protocol and solve the problem of model deviation caused by internal data pollution of industrial personal computer.The prototype system was implemented and experimentally verified in the coiling device control system.Compared with the industrial control security detection paper using non-business behavior modeling,the detection accuracy of man-in-the-middle attack and remote attack was improved by 17% and 24% respectively.The validation results on two datasets showed that the accuracy of the proposed method was more than 5% higher than that of the existing FedAvg aggregation algorithm,and the accuracy was 8% higher than that of the existing FedAvg aggregation algorithm in the case of data poisoning attack.Moreover,it could prevent attackers from using the management network to detect background vulnerabilities to launch remote attacks on the control network and reduce the attack surface. © 2025 CIMS. All rights reserved.

Keyword:

Data privacy Digital storage Network security Personal computers Hardware security

Author Community:

  • [ 1 ] [Li, Jianjun]China Tobacco Zhejiang Industrial Co., Ltd., Hangzhou; 310008, China
  • [ 2 ] [Wang, Wanjiang]China Tobacco Zhejiang Industrial Co., Ltd., Hangzhou; 310008, China
  • [ 3 ] [Chen, Peng]College of Information, Beijing University of Technology, Beijing; 100124, China
  • [ 4 ] [Chen, Peng]Hangzhou Youwen Automation System Co., Ltd., Hangzhou; 310010, China
  • [ 5 ] [Zhang, Shuai]College of Information, Beijing University of Technology, Beijing; 100124, China
  • [ 6 ] [Zhang, Shuai]Hangzhou Youwen Automation System Co., Ltd., Hangzhou; 310010, China
  • [ 7 ] [Zhang, Lihong]China Tobacco Zhejiang Industrial Co., Ltd., Hangzhou; 310008, China
  • [ 8 ] [Li, Wei]China Tobacco Zhejiang Industrial Co., Ltd., Hangzhou; 310008, China
  • [ 9 ] [Dong, Huiliang]China Tobacco Zhejiang Industrial Co., Ltd., Hangzhou; 310008, China

Reprint Author's Address:

Email:

Show more details

Related Keywords:

Related Article:

Source :

Computer Integrated Manufacturing Systems, CIMS

ISSN: 1006-5911

Year: 2025

Issue: 3

Volume: 31

Page: 841-854

Cited Count:

WoS CC Cited Count:

SCOPUS Cited Count:

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 8

Affiliated Colleges:

Online/Total:757/10657871
Address:BJUT Library(100 Pingleyuan,Chaoyang District,Beijing 100124, China Post Code:100124) Contact Us:010-67392185
Copyright:BJUT Library Technical Support:Beijing Aegean Software Co., Ltd.