An Industrial Internet Security Assessment Model Based on a Selectable Confidence Rule Base.

Sensors (Basel)

College of Computer Science and Information Engineering, Harbin Normal University, Harbin 150025, China.

Published: November 2024


Category Ranking

98%

Total Visits

921

Avg Visit Duration

2 minutes

Citations

20

Article Abstract

To mitigate the impact of network security on the production environment in the industrial internet, this paper proposes a confidence rule-based security assessment model for the industrial internet that uses selective modeling. First, a definition of selective modeling tailored to the characteristics of the industrial internet is provided. Based on this, the assessment process of the Selectable Belief Rule Base (BRB-s) model is introduced. Then, in combination with the Selection covariance matrix adaptive evolution strategy (S-CMA-ES) algorithm, a parameter optimization method for the BRB-s model is designed, which expands the selective constraints on expert knowledge. This model establishes a better unidirectional selection strategy among different subgroups, and while expanding the selection constraints on expert knowledge, it achieves better evaluation results. This effectively addresses the issue of reduced modeling accuracy caused by insufficient data and poor data quality. Finally, the experiments of different evaluation models on industrial data sets are compared, and good results are obtained, which verify the evaluation accuracy of the industrial Internet network security situation assessment model proposed in this paper and the feasibility and effectiveness of the S-CMA-ES optimization algorithm.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC11644398PMC
http://dx.doi.org/10.3390/s24237577DOI Listing

Publication Analysis

Top Keywords

industrial internet
20
assessment model
12
security assessment
8
rule base
8
network security
8
selective modeling
8
brb-s model
8
constraints expert
8
expert knowledge
8
industrial
6

Similar Publications

Accurate imputation of missing data is crucial in the Industrial Internet-of-Things (IIoT), where operations are often compromised by noisy samples from harsh environments. Traditional imputation methods struggle with such noise due to their black-box nature or lack of adaptability. To address this issue, we recast data imputation as a distribution alignment challenge, utilizing the flexibility of optimal transport (OT) to handle noisy samples.

View Article and Find Full Text PDF

Next-Generation Food Drying: Specialized and Smart Approaches to Boost Efficiency and Quality.

Compr Rev Food Sci Food Saf

September 2025

Department of Life Science (Food Science and Technology Division), GITAM University, Visakhapatnam, Andhra Pradesh, India.

Drying is a critical unit operation in food processing, essential for extending shelf life, ensuring microbial safety, and preserving the nutritional and sensory attributes of food products. However, conventional convective drying techniques are often energy-intensive and lead to undesirable changes such as texture degradation, loss of bioactive compounds, and reduced product quality, thereby raising concerns regarding their sustainability and efficiency. In response, recent advancements have focused on the development of innovative drying technologies that offer energy-efficient, rapid, and quality-preserving alternatives.

View Article and Find Full Text PDF

Background: The automation of processes and services has transformed various industries, including the restaurant sector. Technologies such as the Internet of Things (IoT), machine learning, Radio Frequency Identification (RFID), and big data have been increasingly adopted to enhance service delivery, improve user experiences, and enable data traceability. By collecting user feedback and analyzing sentiments, these technologies facilitate decision-making and offer predictive insights into future food preferences.

View Article and Find Full Text PDF

The increasing adoption of the Internet of Things (IoT) in energy systems has brought significant advancements but also heightened cyber security risks. Virtual Power Plants (VPPs), which aggregate distributed renewable energy resources into a single entity for participation in energy markets, are particularly vulnerable to cyber-attacks due to their reliance on modern information and communication technologies. Cyber-attacks targeting devices, networks, or specific goals can compromise system integrity.

View Article and Find Full Text PDF

The proliferation of online gambling platforms has heightened concerns over their potential to intensify problematic gambling behaviors. While previous research has examined various risk factors, the influence of prior online gaming experience on gambling transitions remains underexplored. This study investigates whether and how engagement with online gaming facilitates the migration from offline to online gambling.

View Article and Find Full Text PDF